ShadowPad Malware Exploits WSUS for Full Access

Overview of the Exploited WSUS Flaw

ShadowPad Malware activity is increasing due to a severe WSUS vulnerability. Threat actors now use this flaw to gain full control of Windows systems. The vulnerability, known as CVE-2025-59287, enables remote code execution with system privileges. Therefore, attackers can enter networks with minimal resistance.

Researchers recently confirmed that attackers actively target servers running WSUS. They then exploit the flaw to perform reconnaissance and deploy harmful tools. However, the most damaging payload delivered so far is the ShadowPad backdoor.

How Attackers Gain Initial Access

Attackers begin by scanning for publicly exposed WSUS servers. They then exploit the deserialization flaw to enter the system. After gaining access, they use a command-line utility to open a system shell. This shell provides the control needed to download further tools.

The attackers rely on built-in system utilities. For example, they use file-transfer commands to contact an external server. They then download and install ShadowPad directly onto the compromised host. This process helps them avoid detection because they use legitimate binaries.

ShadowPad Deployment Through DLL Side-Loading

ShadowPad Malware uses a technique known as DLL side-loading. Attackers run a legitimate binary to activate a malicious DLL file. This DLL remains in memory and loads the ShadowPad modules. Therefore, the malware stays hidden and capable of executing additional functions.

ShadowPad is considered the successor to an earlier espionage tool. It includes anti-detection features and strong persistence methods. Moreover, it loads multiple plugins to perform advanced actions. These plugins allow deeper monitoring and remote control.

Rapid Weaponization After Public PoC Release

Reports note that a proof-of-concept exploit became public shortly before attacks increased. As a result, threat actors quickly adapted it for real-world use. They used it to install ShadowPad across vulnerable servers. This rapid uptake shows how dangerous the vulnerability is.

The flaw is especially serious because it grants system-level privileges. Therefore, attackers can run any command they want. They can install new malware, exfiltrate data, or disrupt operations. However, patched systems are protected from this risk.

Why the Vulnerability Presents Ongoing Threats

CVE-2025-59287 remains under heavy exploitation. Attackers continue to target organizations that have not applied updates. They often run legitimate tools to avoid raising alerts. This strategy makes the exploitation chain harder to detect.

ShadowPad’s modular structure also increases risk. It loads new components whenever attackers choose. Therefore, infected systems may experience ongoing surveillance. If not addressed quickly, the malware can spread deeper into a network.

How to Prevent Similar Attacks

Organizations should patch their WSUS servers immediately and restrict external access to update services. They should also deploy managed detection tools that monitor script execution and detect side-loading activity. Real-time threat hunting and continuous incident response support can further block attackers before they escalate control.

Sleep well, we got you covered.

Scroll to Top