Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan – Hackread – Cybersecurity News, Data Breaches, AI, and More

Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan – Hackread – Cybersecurity News, Data Breaches, AI, and More

A popular software tool used by website owners to check their server’s health is now being used by hackers to take complete control of computers. Researchers at the cybersecurity firm Ontinue have discovered that an open-source tool called Nezha is being repurposed as a Remote Access Trojan (RAT). This allows outsiders to sneak into a system and stay there without being noticed.

The Invisible Threat

For your information, Nezha was originally designed as a helpful tool for the IT community and has gained nearly 10,000 stars on GitHub. It acts like a dashboard for a car, showing how much memory a server is using and if it’s running smoothly.

Because it is legitimate software used by thousands of professionals, security apps usually ignore it. According to researchers, the software shows “0/72 detections” on the VirusTotal scanner. In short, it isn’t actually malware; it’s just a normal tool being exploited by hackers.

Ready to Use “Out of the Box”

Further investigation revealed that Nezha is particularly dangerous because it is “full-featured out of the box.” Unlike many hacking tools that require complex setup, Nezha works immediately after installation, and an attacker “doesn’t need to compile custom payloads” or link multiple tools together to get what they want. It is a one-stop shop for taking over a device.

Once this “agent” is active, it gives the attacker “SYSTEM/root level access,” which is the highest permission a computer has. With this power, they can manage files, run commands, and even open an interactive web terminal to watch the system in real-time. Furthermore, it works on almost anything from Windows and Linux to macOS and even home internet routers. This wide “cross-platform support” means a hacker can manage hundreds of stolen devices from a single dashboard.

Nezha’s central dashboard shows its client-server model (Source: Ontinue)

Blending In to Stay Hidden

As we know it, most hackers have to work hard to hide their tracks. However, Nezha has a built-in advantage: its internet traffic looks completely normal. The tool communicates using standard web protocols that “resemble normal monitoring telemetry” rather than obvious hacking signals. Without inspecting the destination, this network activity doesn’t stand out at all.

This isn’t the first time Nezha has been spotted in the wrong hands. Back in October 2025, another firm, Huntress, found similar attacks targeting organisations across East Asia, including Japan and South Korea.

In this latest case, Ontinue’s team noted that the hackers used a script containing Simplified Chinese messages, suggesting a native speaker. They also discovered the hacker’s command centre was hosted on Alibaba Cloud services in Japan.

Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan – Hackread – Cybersecurity News, Data Breaches, AI, and More
The map shows where Nezha connections are most active (Source: Ontinue)

To stay safe, experts suggest that companies should proactively hunt for Nezha on their systems. If it hasn’t been officially approved by the IT department, its presence is a major red flag.

Experts Share Their Views on Nezha Threat

Sharing their insights with Hackread.com, industry experts noted that this incident is part of a broader trend in digital warfare. Mayuresh Dani, Security Research Manager at Qualys Threat Research Unit, explained that this reflects a strategy where attackers “systematically abuse legitimate software to achieve persistence and lateral movement while evading signature-based defences.”

Dani warned that because Nezha provides such high-level access, it helps attackers “cut development time to reliably execute remote commands” and access files. He urged organisations to “stop viewing tools as either malicious or benign, and instead focus on usage patterns and context.”

Adding to this, John Gallagher, Vice President of Viakoo Labs at Viakoo, noted that the situation is a call for a stronger “Defence in Depth” approach. He pointed out that while agent-based tools like Nezha are useful, they inherently carry more risk because they live directly on the device.

“There needs to be more analysis on the who, what, and why,” Gallagher stated, adding that it is particularly “concerning how the US accounts for the most common location for this running on the internet,” said Gallagher.





Source link