Open-source tool Nezha used as post-exploitation remote access trojan
scworld.com·3d·
Discuss: Hacker News
🛡Vulnerability Management
Preview
Report Post

Ransomware, Malware, Network Security, Third-party code

December 24, 2025

Cyber security concept. Toy horse on a digital screen, symbolizes the attack of the Trojan virus. 3D illustration.

(Adobe Stock)

Attackers were observed using Nezha, a legitimate open-source monitoring tool, as a post-exploitation remote access trojan (RAT)

In a [Dec. 22 blog post](https…

Similar Posts

Loading similar posts...