In a yet another thrilling episode of ‘Why Develop New Tools When You Can Remotely Borrow Others,’ Chinese threat actors, with credentials possibly obtained from a phishing scheme for dummies, are now playing with the Nezha open-source monitoring tool. But it seems their intent is far from just monitoring your online cat video bingeing habits.
Apparently, the evil geniuses found a way to convert this innocent-by-design tool into a well-oiled malware delivery mechanism, aptly choosing the Gh0st RAT malware to wreak havoc. If we didn’t know any better, we’d say they’re just ghosting the whole ‘ethics in cyber warfare’ discussion.
Utilizing an incredibly progressive method called log poisoning, which literally nobody asked for, they managed to plant a web shell on unsuspecting targets. The only evident question is, when will they add ‘hacked into your life’ as a feature on their LinkedIn profiles?

Leave a Reply