Windows Server flaw targeted by hackers to spread malware – here’s what we know

  • Chinese state-sponsored actors are exploiting CVE-2025-59287, a critical WSUS flaw enabling unauthenticated RCE with SYSTEM privileges
  • AhnLab reports attackers using PowerCat and certutil/curl to deploy ShadowPad, a PlugX successor backdoor
  • Likely targets include government, defense, telecom, and critical infrastructure sectors

Chinese state-sponsored threat actors are reportedly actively exploiting a vulnerability in the Microsoft Windows Server Update Services (WSUS), to spread malware, experts have warned.

As part of its October 2025 Patch Tuesday cumulative update, Microsoft addressed CVE-2025-59287, a “deserialization of untrusted data” flaw found in Windows Server Update Service (WSUS). The flaw was given a severity score of 9.8/10 (critical), as it apparently allows for remote code execution (RCE) attacks. It can be abused in low-complexity attacks, without user interaction, granting unauthenticated, unprivileged threat actors the ability to run malicious code with SYSTEM privileges. In theory, it would allow them to pivot and infect other WSUS servers, too.

Soon after, a publicly available proof-of-concept (PoC) code was spotted, prompting Microsoft to release an out-of-band (OOB) security update, as well.

Used for ShadowPad deployment

Now, security researchers from AhnLab Security Intelligence Center (ASEC) said they’re seeing attacks against unpatched endpoints, hinting that it’s the work of the Chinese.

“The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access,” the report reads. “They then used PowerCat, an open-source PowerShell-based Netcat utility, to obtain a system shell (CMD). Subsequently, they downloaded and installed ShadowPad using certutil and curl.”

ShadowPad is reportedly a successor to PlugX, a modular backdoor which was “widely used” by Chinese state-sponsored hacking collectives. It is deployed on target endpoints via DLL side-loading, through a legitimate binary named ETDCtrlHelper.exe.

We don’t know how many companies were targeted through WSUS, where they are, or in which industries they operate. However, if it’s the work of the Chinese, it’s either against the government, military and defense, telecommunications, or critical infrastructure.

“After the proof-of-concept (PoC) exploit code for the vulnerability was publicly released, attackers quickly weaponized it to distribute ShadowPad malware via WSUS servers,” AhnLab said. “This vulnerability is critical because it allows remote code execution with system-level permission, significantly increasing the potential impact.”

WSUS allows IT admins to manage patching computers within their network.

Via The Hacker News

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Read more @ TechRadar

Latest posts

ICYMI: the week’s 7 biggest tech stories from testing Android XR glasses to a revolutionary smart ring

It has been another busy week in the world of tech, which included us testing new Android XR glasses and watching the new Supergirl...

The inevitable has happened – the EU has U-turned on its plan to ban the sale of ICE cars by 2035

Ban on ICE cars could be pushed back to 2040Manufacturers have argued against the legislationMore hybrid and range extender powertrains likely to arrive A...

The next phase of AI is agentic, and it starts with data architecture

If you look at the last decade of AI progress, most of it has been measured in a single dimension: bigger models and better...

I’ve found a new favorite pair of sub-$100 cuff-style open earbuds, with some surprisingly premium features

Soundpeats Clip1: Two minute reviewThe real measure of whether earbuds are good, is if I keep wearing them after the two-week testing period is...

New US border checks could involve scanning your last five years of social media history– here’s what you need to know

The US government wants to check your social media posts at the borderThat could impact your data privacy and free speech rightsPrivacy advocates are...

The race to zero downtime is on – and AI is leading it

It’s the moment every online business dreads. Pages freeze, payments stall, and seconds later, the site goes dark. In those brief minutes, sales evaporate,...

I tested the HHKB Professional Classic Type-S — a niche option for those prepared to learn a new keyboard layout to get Topre key...

HHKB Professional Classic Type-S keyboard: 30-second reviewWhen people first get into computing, the first peripherals they develop an opinion on are the mouse and...

This is perhaps the smallest mini PC with a 5060-class GPU you can buy right now — but you will have to go all...

FEVM FAEX1 mini PC features a Ryzen AI Max+ 395 CPU with 16 coresMemory is soldered LPDDR5X-8533, available in 64 or 128GBStorage includes three...

I tested 4 of Dyson’s best stick vacuums head to head – this is the one to buy, and the one to avoid

Most of Dyson's vacuums look pretty much the same, so figuring out what the differences are – and crucially, if those differences will translate...

Virgin Media offers Meta Ray-Ban smart glasses or £125 bill credit with new broadband and TV packages

Virgin Media is offering new customers the opportunity to get a pair of Meta Ray-Ban (Gen 1) smart glasses, worth £329, or a £125...