Ransomware Operators and Chinese APTs Exploiting SAP NetWeaver Vulnerabilities

Industry
Written by
Anthony M. Freed
Published on
May 15, 2025

Ransomware groups and Chinese state-sponsored APTs are actively exploiting two critical vulnerabilities in SAP NetWeaver's Visual Composer component: CVE-2025-31324 (CVSS 10) and CVE-2025-42999 (CVSS 9.1).  

These flaws allow unauthenticated remote code execution, enabling attackers to deploy webshells for persistent access, Security Week reports. Exploitation has been ongoing since January 2025, with opportunistic actors also leveraging previously installed webshells.  

SAP released patches for CVE-2025-31324 on April 24 and addressed CVE-2025-42999 in its May 2025 Security Patch Day. Notably, Chinese APTs such as UNC5221, UNC5174, and CL-STA-0048 have been linked to these intrusions, targeting critical infrastructure sectors across the UK, US, and Saudi Arabia.  

Additionally, ransomware groups BianLian and RansomEXX have exploited these vulnerabilities, though no ransomware payloads have been confirmed. Organizations are urged to apply the latest SAP patches promptly to mitigate these threats.

Takeaway: The Time-to-Exploit (TTE) window isn’t just shrinking—it’s collapsing. What used to be weeks is now days, sometimes hours. You blink after a CVE drops and someone’s already got a working exploit in the wild.  

Threat actors are moving like a startup with fresh VC funding—they are fast, agile, and focused on taking advantage of vulnerabilities, while most targeted orgs are still trying to figure out who owns the app or device, whether it’s in their environment, and then whether or not they need to patch it.

And here’s the kicker: ransomware crews aren’t just playing the same old game anymore, they’re increasingly borrowing straight from the APT playbook—zero-days, custom tooling, layered C2, stealthy lateral movement. The line between a government op and a for-profit extortion crew? Blurred to hell. It's all just cyber ops now.

This isn’t a world where check-the-box security works. You can’t rely on annual audits and patch cycles anymore. You need real-time intel, automation, and tools that actually fight back, not just alert you while everything burns.  

Because in today’s landscape, it’s about resilience and outpacing an enemy that doesn’t sleep, doesn’t care, and isn’t playing by the old rules. This isn’t simple IT security anymore, it’s more like live combat where the adversary always has a slight advantage.

 

Halcyon.ai eliminates the business impact of ransomware. Modern enterprises rely on Halcyon to prevent ransomware attacks, eradicating cybercriminals’ ability to encrypt systems, steal data, and extort companies – talk to a Halcyon expert today to find out more, and check out our quarterly RaaS and extortion group reference guide, Power Rankings: Ransomware Malicious Quartile.

A laptop screen with a message that says Take Zero Chances With Ransomware.
Get a Demo

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.