Home ยป ShadowPad APT Weaponizes WSUS RCE CVE-2025-59287

ShadowPad APT Weaponizes WSUS RCE CVE-2025-59287

ShadowPad malware exploiting WSUS CVE-2025-59287 to gain SYSTEM access on Windows servers ShadowPad uses WSUS deserialization flaw CVE-2025-59287 to pivot from updates to full SYSTEM control

Threat actors currently abuse ๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ-๐Ÿฑ๐Ÿต๐Ÿฎ๐Ÿด๐Ÿณ, a critical remote code execution flaw in Windows Server Update Services (WSUS), to deliver and run the ๐—ฆ๐—ต๐—ฎ๐—ฑ๐—ผ๐˜„๐—ฃ๐—ฎ๐—ฑ backdoor with full SYSTEM privileges on Windows servers. Instead of going after exposed RDP or VPN services directly, they move through a trusted update channel that many organizations still treat as โ€œsafe by default.โ€ย 

In the cases analyzed by incident responders, adversaries first gain access to WSUS, then pivot from that high-privileged foothold to install ShadowPad across the environment. Consequently, the compromise does not look like a typical phishing-driven intrusion; it looks like โ€œbusiness as usualโ€ patching until defenders correlate the activity with unusual tooling and outbound connections.ย 

๐—›๐—ผ๐˜„ ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ๐˜€ ๐—ด๐—ฒ๐˜ ๐—ณ๐—ฟ๐—ผ๐—บ ๐—ช๐—ฆ๐—จ๐—ฆ ๐˜๐—ผ ๐—ฎ ๐—ฆ๐—ฌ๐—ฆ๐—ง๐—˜๐—  ๐˜€๐—ต๐—ฒ๐—น๐—น

In this campaign, the operators ๐—ฑ๐—ผ๐—ปโ€™๐˜ rely on exotic custom loaders at the start. Instead, they abuse the WSUS deserialization flaw to execute arbitrary code on the server, then lean on well-known tools to complete the compromise chain. According to public technical reporting, they specifically target Windows servers with WSUS enabled and reachable, then exploit CVE-2025-59287 to obtain code execution in the WSUS context.

After they establish that initial foothold, they ๐—ถ๐—บ๐—ฝ๐—ผ๐—ฟ๐˜ a PowerShell-based Netcat equivalent, usually ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ๐—–๐—ฎ๐˜, to obtain an interactive ๐—ฆ๐—ฌ๐—ฆ๐—ง๐—˜๐—  shell. The typical pattern involves downloading a PowerCat script from a remote source and then launching a reverse shell toward attacker-controlled infrastructure. This step turns WSUS from a simple update distribution endpoint into a live command-and-control pivot.ย 

From there, the operators download ShadowPad components using ๐—ฐ๐˜‚๐—ฟ๐—น.๐—ฒ๐˜…๐—ฒ and ๐—ฐ๐—ฒ๐—ฟ๐˜๐˜‚๐˜๐—ถ๐—น.๐—ฒ๐˜…๐—ฒ, both native Windows tools that often slip under the radar because administrators also use them legitimately. The malware then arrives in several staged files, which the attackers decode and execute directly on the server.ย 

๐—ช๐—ต๐—ฎ๐˜ ๐—บ๐—ฎ๐—ธ๐—ฒ๐˜€ ๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ-๐Ÿฑ๐Ÿต๐Ÿฎ๐Ÿด๐Ÿณ ๐˜€๐—ผ ๐˜€๐—ฒ๐—ฟ๐—ถ๐—ผ๐˜‚๐˜€

The vulnerability itself stems from ๐—ฑ๐—ฒ๐˜€๐—ฒ๐—ฟ๐—ถ๐—ฎ๐—น๐—ถ๐˜‡๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ผ๐—ณ ๐˜‚๐—ป๐˜๐—ฟ๐˜‚๐˜€๐˜๐—ฒ๐—ฑ ๐—ฑ๐—ฎ๐˜๐—ฎ inside WSUS. In practice, the service processes specially crafted serialized objects from an attacker-controlled request, then reconstructs those objects without sufficient validation. As a result, the attacker can force the server to execute arbitrary code. This class of issue fits squarely into the broader insecure deserialization problem space that OWASP and others have warned about for years.

Because WSUS often runs with ๐—ฆ๐—ฌ๐—ฆ๐—ง๐—˜๐—  privileges and because organizations frequently centralize update distribution on a small number of critical servers, exploitation immediately raises the stakes. An unauthenticated attacker who reaches the vulnerable WSUS endpoint can ๐—บ๐—ผ๐˜ƒ๐—ฒ ๐—ถ๐—ป๐˜€๐˜๐—ฎ๐—ป๐˜๐—น๐˜† from โ€œoutside the networkโ€ to โ€œinside with SYSTEM rights,โ€ which compresses the usual kill chain into just a few requests.ย 

๐—ฆ๐—ต๐—ฎ๐—ฑ๐—ผ๐˜„๐—ฃ๐—ฎ๐—ฑโ€™๐˜€ ๐—ฟ๐—ผ๐—น๐—ฒ ๐—ถ๐—ป ๐—–๐—ต๐—ถ๐—ป๐—ฒ๐˜€๐—ฒ-๐—น๐—ถ๐—ป๐—ธ๐—ฒ๐—ฑ ๐—ผ๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€

ShadowPad itself has a long and documented history in Chinese state-aligned espionage campaigns. Threat intelligence teams describe it as a ๐—บ๐—ผ๐—ฑ๐˜‚๐—น๐—ฎ๐—ฟ, ๐—ฝ๐—น๐˜‚๐—ด๐—ถ๐—ป-๐—ฏ๐—ฎ๐˜€๐—ฒ๐—ฑ backdoor that supports file operations, credential theft, lateral movement, and long-term command-and-control. Since its emergence in the mid-2010s, multiple APT groups have adopted ShadowPad as a shared capability rather than a one-off implant.ย 

In this WSUS-focused campaign, once ShadowPad lands on the server, it does not simply sit as a static file. Instead, it loads through ๐——๐—Ÿ๐—Ÿ ๐˜€๐—ถ๐—ฑ๐—ฒ-๐—น๐—ผ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด. The attackers place a malicious DLL alongside a legitimate executable such as ๐—˜๐—ง๐——๐—–๐˜๐—ฟ๐—น๐—›๐—ฒ๐—น๐—ฝ๐—ฒ๐—ฟ.๐—ฒ๐˜…๐—ฒ. When Windows runs that binary, it automatically loads the attacker-controlled DLL, which then injects the ShadowPad payload into memory. This technique aligns with known DLL side-loading patterns tracked in frameworks like MITRE ATT&CK.ย 

Because ShadowPad operates largely in memory and because it uses encrypted configuration data, defenders often struggle to identify it through simple file-based signatures. Instead, teams usually need to combine process behavior, network telemetry, and registry analysis to detect the presence of its core modules and plugins.ย 

๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ ๐˜๐—ฒ๐—น๐—ฒ๐—บ๐—ฒ๐˜๐—ฟ๐˜†: ๐—ณ๐—ฟ๐—ผ๐—บ ๐—ช๐—ฆ๐—จ๐—ฆ ๐—ฒ๐—ป๐—ฑ๐—ฝ๐—ผ๐—ถ๐—ป๐˜ ๐˜๐—ผ ๐—ฆ๐—ต๐—ฎ๐—ฑ๐—ผ๐˜„๐—ฃ๐—ฎ๐—ฑ ๐—–๐Ÿฎ

Telemetry from observed incidents shows a consistent pattern. First, the attacker hits a publicly exposed WSUS instance and runs the deserialization exploit. Next, they use PowerShell to pull down PowerCat, then establish a reverse shell toward their infrastructure. After that, they run ๐—ฐ๐˜‚๐—ฟ๐—น.๐—ฒ๐˜…๐—ฒ and ๐—ฐ๐—ฒ๐—ฟ๐˜๐˜‚๐˜๐—ถ๐—น.๐—ฒ๐˜…๐—ฒ to download ShadowPad components from an external IP address before decoding intermediate files into the final payload.ย 

Once the malware initializes, it loads a ๐—ฐ๐—ผ๐—ฟ๐—ฒ ๐—บ๐—ผ๐—ฑ๐˜‚๐—น๐—ฒ that acts as an orchestrator for additional plugins. Those plugins provide capabilities such as command execution, data exfiltration, and lateral movement. Because the operators control which modules they deploy, the same codebase can support espionage-focused campaigns in one environment and more disruptive or monetization-driven operations in another.ย 

Investigators also observed use of legitimate forensic tools like ๐—ฉ๐—ฒ๐—น๐—ผ๐—ฐ๐—ถ๐—ฟ๐—ฎ๐—ฝ๐˜๐—ผ๐—ฟ in some exploitation chains, either for reconnaissance or as part of a hands-on attack where the adversary repurposes blue-team utilities for their own situational awareness. That behavior further complicates detection efforts because the tool appears in many environments as a normal DFIR component.ย 

๐—ช๐—ต๐˜† ๐—ช๐—ฆ๐—จ๐—ฆ ๐—ฏ๐—ฒ๐—ฐ๐—ผ๐—บ๐—ฒ๐˜€ ๐˜€๐˜‚๐—ฐ๐—ต ๐—ฎ ๐—ต๐—ถ๐—ด๐—ต-๐˜ƒ๐—ฎ๐—น๐˜‚๐—ฒ ๐˜๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜

From a defenderโ€™s point of view, WSUS often sits in a โ€œtrusted infrastructureโ€ category. Teams usually prioritize hardening internet-facing web applications, VPN concentrators, and identity providers, while WSUS quietly distributes updates from inside the network. Because of that, logging and monitoring on WSUS servers frequently lags behind other critical assets.ย 

However, the service holds several properties that make it ideal for attackers. It usually runs with ๐—ต๐—ถ๐—ด๐—ต ๐—ฝ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ๐˜€, it brokers trust between Microsoft and the organizationโ€™s endpoints, and it touches a large percentage of domain-joined systems. Therefore, once an APT gains control of WSUS, that actor gains both a distribution channel and a reconnaissance hub. In the ShadowPad scenario, the attackers use WSUS as a reliable pivot into Windows servers that administrators already expect to receive traffic from the update service.ย 

๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฎ๐—น ๐—ฑ๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐—ฑ๐—ฒ๐—ฎ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—ฆ๐—ต๐—ฎ๐—ฑ๐—ผ๐˜„๐—ฃ๐—ฎ๐—ฑ ๐—ฎ๐—ป๐—ฑ ๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ-๐Ÿฑ๐Ÿต๐Ÿฎ๐Ÿด๐Ÿณ

Security teams who suspect exposure to CVE-2025-59287 or to ShadowPad should move beyond simple patch checks. They should also ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—น๐—ผ๐—ด๐˜€ for PowerShell sessions that download remote scripts, especially any commands that reference PowerCat, raw GitHub URLs, or one-line invoke expressions. In addition, they should inspect process creation logs for abnormal invocations of curl.exe and certutil.exe on WSUS hosts, particularly where those utilities connect to unrecognized IP addresses or ports.ย 

Beyond that, defenders should baseline which binaries normally run on their WSUS servers, then ๐—ต๐˜‚๐—ป๐˜ for unusual DLL loading patterns that may indicate side-loading behavior. Suspicious pairs of legitimate executables and unexpected DLLs, especially in paths that host vendor-provided tools, deserve close scrutiny. Threat intelligence and ATT&CK references for DLL side-loading can help analysts map observed events to known techniques.

Finally, organizations should examine their use of deserialization across internal services more broadly. Whenever a critical component ingests serialized objects from network clients, it should treat that data as hostile, validate it rigorously, and avoid dangerous serializers where possible. The WSUS case underlines how quickly a deserialization issue can evolve from a theoretical code-execution bug into a fully weaponized intrusion vector that deploys advanced implants.ย 

๐—ฆ๐˜๐—ฟ๐—ฎ๐˜๐—ฒ๐—ด๐—ถ๐—ฐ ๐—บ๐—ถ๐˜๐—ถ๐—ด๐—ฎ๐˜๐—ถ๐—ผ๐—ป: ๐—ฝ๐—ฎ๐˜๐—ฐ๐—ต๐—ถ๐—ป๐—ด, ๐˜€๐—ฒ๐—ด๐—บ๐—ฒ๐—ป๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป, ๐—ฎ๐—ป๐—ฑ ๐˜ƒ๐—ถ๐˜€๐—ถ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜†

Even though Microsoft has already issued patches for CVE-2025-59287, many organizations still run vulnerable WSUS instances. Therefore, patch verification must sit at the top of the response plan. Teams should confirm that both the original and any out-of-band updates have reached all WSUS servers, including lab or test environments that quietly sync from production.

At the same time, security architects should ๐—ฟ๐—ฒ๐—ฒ๐˜ƒ๐—ฎ๐—น๐˜‚๐—ฎ๐˜๐—ฒ WSUS network exposure. Whenever possible, they should restrict access to management networks, limit inbound connectivity on WSUS ports, and avoid exposing WSUS directly to the public internet. Where business constraints force broader exposure, they should introduce additional inspection and authentication layers in front of the service so that anonymous requests cannot reach the deserialization surface.ย 

To round out the mitigation strategy, defenders should strengthen endpoint visibility. Tools like Velociraptor and other DFIR platforms can provide rapid collection of process, registry, and network data across large fleets, which enables targeted hunts for ShadowPad indicators or deserialization exploit traces. However, teams must configure those tools carefully so that adversaries cannot repurpose them if they compromise their control plane.

๐—™๐—”๐—ค๐˜€ย 

๐—ค: ๐——๐—ผ๐—ฒ๐˜€ ๐—ฆ๐—ต๐—ฎ๐—ฑ๐—ผ๐˜„๐—ฃ๐—ฎ๐—ฑ ๐—ผ๐—ป๐—น๐˜† ๐˜๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜ ๐—ช๐—ฆ๐—จ๐—ฆ?
ShadowPad does not limit itself to WSUS. The backdoor appears in campaigns that abuse a variety of initial access vectors, including supply-chain compromises and other server-side vulnerabilities.ย 

๐—ค: ๐—œ๐—ณ ๐—œ ๐—ต๐—ฎ๐˜ƒ๐—ฒ ๐—ฝ๐—ฎ๐˜๐—ฐ๐—ต๐—ฒ๐—ฑ ๐—ช๐—ฆ๐—จ๐—ฆ, ๐—ฐ๐—ฎ๐—ป ๐—œ ๐—ฎ๐˜€๐˜€๐˜‚๐—บ๐—ฒ ๐—œโ€™๐—บ ๐˜€๐—ฎ๐—ณ๐—ฒ?
Patch deployment significantly reduces risk, yet it does not guarantee that attackers never exploited the bug earlier. Teams should still run targeted threat-hunting queries on WSUS servers and surrounding infrastructure, looking for the PowerCat activity, odd curl and certutil usage.

๐—ค: ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐—ณ ๐—บ๐˜† ๐—ผ๐—ฟ๐—ด๐—ฎ๐—ป๐—ถ๐˜‡๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฐ๐—ฎ๐—ปโ€™๐˜ ๐—ฝ๐—ฎ๐˜๐—ฐ๐—ต ๐—ช๐—ฆ๐—จ๐—ฆ ๐—ถ๐—บ๐—บ๐—ฒ๐—ฑ๐—ถ๐—ฎ๐˜๐—ฒ๐—น๐˜†?
In cases where patching lags behind, organizations should harden network access, introduce strict ACLs around WSUS, and implement high-fidelity monitoring on the vulnerable endpoints. Compensating controls never fully replace fixes.

Leave a Reply

Your email address will not be published. Required fields are marked *