By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Ontinue warns attackers are abusing Nezha monitoring tool as stealthy remote access trojan – News
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Ontinue warns attackers are abusing Nezha monitoring tool as stealthy remote access trojan – News
News

Ontinue warns attackers are abusing Nezha monitoring tool as stealthy remote access trojan – News

News Room
Last updated: 2025/12/22 at 6:10 AM
News Room Published 22 December 2025
Share
Ontinue warns attackers are abusing Nezha monitoring tool as stealthy remote access trojan –  News
SHARE

A new report out today from Swiss artificial intelligence-powered managed extended detection and response company Ontinue AG warns of the growing abuse of Nezha, a legitimate open-source server monitoring tool, as a stealthy post-exploration remote access trojan.

Nezha, initially developed for the Chinese information technology community, has gained nearly 10,000 stars on GitHub and is actively maintained. The tool is used by systems administrators to monitor multiple servers, track resource usage, receive alerts and perform remote maintenance.

The problem with Nezha is that despite its legitimate use, it’s also now being used by attackers after initial compromise to gain persistent, high-privilege access to victim environments.

The Nezha agent by default provides attackers with system-level access on Windows and root access on Linux. That includes allowing for full command execution, interactive terminal sessions and file management without the need to exploit vulnerabilities or escalate privileges.

Since the software is legitimate and unmodified, it currently registers zero detections across major antivirus engines, including VirusTotal, making it highly effective at evading signature-based defenses.

Ontinue’s researchers discovered the malicious use of Nezha during an incident response engagement where the attackers attempted to deploy Nezha via a bash script that silently installed the agent and connected it to attacker-controlled infrastructure. The script included configuration values pointing to a command-and-control server and a shared authentication secret that allowed the agent to register with the Nezha dashboard.

The report notes that the deployment used a GitHub proxy service and disabled TLS, although the reasons for this remain unclear.

Further investigation found that the exposed Nezha dashboard associated with the incident appeared to manage hundreds of endpoints, suggesting widespread compromise. The infrastructure was hosted on Alibaba Cloud IP space geolocated to Japan, highlighting how attackers can easily blend malicious operations into legitimate cloud environments.

Testing confirmed that Nezha’s architecture, which combines web dashboard traffic and agent communications through a single port using standard HTTP and gRPC protocols, creates network activity that closely resembles normal monitoring telemetry. Because it does look legitimate, it allows attackers to maintain persistent access while avoiding obvious command-and-control indicators.

Mayuresh Dani, security research manager at the Qualys Threat Research Unit, told News via email that “the weaponization of Nezha reflects an emerging modern attack strategy where threat actors systematically abuse legitimate software to achieve persistence and lateral movement while evading signature-based defenses.”

“Networks where this server monitoring tool is pre-known defender teams might even overlook this anomalous activity,” explains Dani. “This is not novel at all, as this behavior has been seen in the past with the usage of ‘Living Off the Land’ techniques and remote monitoring and management tools such as TeamViewer.”

He added that “what’s concerning is that the Nezha agent provides SYSTEM/root-level access. Though it isn’t malicious by design, it helps threat actors repurpose the use of this legitimate tool, cut development time to reliably execute remote commands, access remote files and access the compromised system using interactive shells.”

Dani recommends that to defend against the risk, organizations should inventory all RMM and remote access tools deployed across their infrastructure, configure monitoring tools for behavioral detection with real-time alerting and, if necessary, establish lifetime restrictions on the usage of RMM tools to prevent malicious reuse.

Image: News/Ideogram

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.

About News Media

News Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of News, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — News Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, News Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Thames Valley Police roll out facial recognition vans – UKTN Thames Valley Police roll out facial recognition vans – UKTN
Next Article Chinese EV maker Xpeng reportedly turns to hybrids · TechNode Chinese EV maker Xpeng reportedly turns to hybrids · TechNode
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Toad: A Unified CLI Tool for All Your LLMs That Promises Improved UX From Existing Ones
Toad: A Unified CLI Tool for All Your LLMs That Promises Improved UX From Existing Ones
News
Social media competitor analysis: Free template for 2026
Social media competitor analysis: Free template for 2026
Computing
How This Dating App Uses AI to Match People Based on Something Truly Human: Music
How This Dating App Uses AI to Match People Based on Something Truly Human: Music
News
The Infinite Library Problem: What Cognitive Overload Actually Does to the Brain | HackerNoon
The Infinite Library Problem: What Cognitive Overload Actually Does to the Brain | HackerNoon
Computing

You Might also Like

Toad: A Unified CLI Tool for All Your LLMs That Promises Improved UX From Existing Ones
News

Toad: A Unified CLI Tool for All Your LLMs That Promises Improved UX From Existing Ones

4 Min Read
How This Dating App Uses AI to Match People Based on Something Truly Human: Music
News

How This Dating App Uses AI to Match People Based on Something Truly Human: Music

9 Min Read
Are We Repeating The Mistakes Of The Last Bubble?
News

Are We Repeating The Mistakes Of The Last Bubble?

4 Min Read
MPs question UK Palantir contracts after investigation reveals security concerns
News

MPs question UK Palantir contracts after investigation reveals security concerns

8 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?