Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hunt Researchers Expose Tools Targeting Taiwanese Infrastructure
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hunt Researchers Expose Tools Targeting Taiwanese Infrastructure

Highlights

  • Hunt team exposed a web server targeting Taiwan’s government infrastructure.

  • Tools like Nmap, SQLMap, and BlueShell were utilized by the threat actor.

  • Continuous monitoring and analysis of open directories are essential.

Ethan Moreno
Last updated: 20 June, 2024 - 12:16 pm 12:16 pm
Ethan Moreno 11 months ago
Share
SHARE

An exposed web server used in cyber-attacks against the Taiwanese Freeway Bureau and a local data center has been identified by the Hunt Research Team. The server administrator used open-source tools such as Nmap, SQLMap, and the backdoor BlueShell. This discovery underscores the persistent threat to Taiwan’s government agencies and critical infrastructure. The original report from Hunt can provide further insights into this discovery.

Contents
Initial Discovery: Exposed Server & ToolsUse of Advanced Bash Scripts and BlueShell Backdoor

Initial Discovery: Exposed Server & Tools

Hunt researchers found a publicly accessible web server at IP address 103.98.73.189:8080 in Taiwan. The server, running a Python-based web server (SimpleHTTP/0.6 Python/3.8.2), was temporarily exposed before the threat actor likely corrected the error. By using Hunt’s Open Directory Search feature, the team downloaded files from the server to study the threat actor’s methods.

The server hosted various files, revealing the use of SQLMap to scan for vulnerabilities within a subdomain of the Taiwanese government’s freeway.gov.tw server. Key files such as log, session.sqlite, and target.txt provided insights into the attack methods. Additionally, Nmap was used to scan for open ports within a /26 network associated with a Taiwanese data center.

Use of Advanced Bash Scripts and BlueShell Backdoor

Contained within the server’s ./configrc5 directory were several bash files. A notable script named “a” detected CPU types and applied Model-Specific Register (MSR) values for optimization. This indicates a highly knowledgeable threat actor targeting specific network elements. Moreover, two Golang files (bsServer-0530 and bsServerfinal) were found, which through sandbox analysis, matched the BlueShell backdoor, confirming a sophisticated attack strategy.

Additional misconfigured servers targeting Taiwanese organizations were uncovered using Hunt’s Open Directories search function. A significant IP address, 156.251.172.194, was previously highlighted by EclecticIQ in a report on a Chinese threat actor using Cobalt Strike Cat against Taiwanese infrastructure. Various open directories exposed different offensive tools and targets, such as IP address 35.229.211.35 using SecurityTrails API, Acunetix, and ChatGPT.

Another IP, 202.182.105.104, showed scan results against the Cambodian Ministry of Foreign Affairs and a Taiwanese Hakka dialect school. This investigation reveals the extensive reach and methods of threat actors targeting government and institutional entities in Taiwan and beyond. Monitoring and analyzing open directories are essential for identifying and mitigating potential threats.

A prior investigation into open directories revealed similar offensive tactics. Comparatively, the current findings display a consistent use of publicly accessible tools by threat actors, emphasizing the need for improved cybersecurity measures. The tools and methods outlined by Hunt underline the resourcefulness and persistence of these cyber threats.

Comparing the recent and previous discoveries, it is evident that the threat actors employ a low-cost but high-reward strategy, targeting the network’s weaker points. The use of SQLMap and Nmap for scanning and identifying vulnerabilities remains a common thread in these attacks. The incorporation of bash scripts tailored for specific CPU types highlights the sophisticated and targeted nature of these cyber threats.

To mitigate these risks, continuous monitoring and analysis of open directories are crucial. Hunt’s tools offer insights and solutions to identify and counteract these threats. By leveraging advanced search functions and threat intelligence, organizations can better protect their infrastructure and data against persistent cyber attackers.

The comprehensive approach outlined by Hunt provides a roadmap for cybersecurity teams to follow. Continuous vigilance and proactive measures are essential in safeguarding against these evolving threats. The detailed analysis of tools like SQLMap, Nmap, and BlueShell backdoor emphasizes the need for specialized security protocols and regular updates to counteract sophisticated cyber-attacks.

The ongoing research and findings by Hunt highlight the importance of cybersecurity vigilance. The evolving nature of cyber threats necessitates a robust and adaptive security framework to protect critical infrastructure and sensitive data. Understanding and mitigating these threats can help organizations maintain their security posture effectively.

  • Hunt team exposed a web server targeting Taiwan’s government infrastructure.
  • Tools like Nmap, SQLMap, and BlueShell were utilized by the threat actor.
  • Continuous monitoring and analysis of open directories are essential.
You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Apple Watch Unveils Offline Routes Tool in watchOS 11
Next Article Chinese Hackers Breach Asian Telecom Operators Using Advanced Tools

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

North American Robot Orders Stabilize in Early 2025
Robotics
UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
AI Reshapes Global Workforce Dynamics
AI Technology
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?