Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Researchers reveal Ecscape’s flaws in Amazon ECS that allow cross-task qualification theft

Upwork is buying its way to staffing companies beyond freelancers

Fake VPN and spam blocker apps associated with vextrio used in ad fraud, subscription scams

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers deploy Samsung Magicinfo, Geovision IoT flaws and deploy Mirai Botnet
Identity

Hackers deploy Samsung Magicinfo, Geovision IoT flaws and deploy Mirai Botnet

userBy userMay 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 6, 2025Ravi LakshmananInternet of Things/Vulnerability

Threat actors have been observed to actively harness security flaws on Geovision’s End of the Apocalypse (EOL) Internet of Things (IoT) devices and surround them with Mirai BotNet to introduce distributed denial (DDOS) attacks.

Activities first observed by the Akamai Security Intelligence Unresponsive Team (SIRT) in early April 2025 include the exploitation of two operating system command injection flaws (CVE-2024-6047 and CVE-2024-11120, CVSS score: 9.8) that can be used to execute any system command.

“The exploit targets the endpoint of the /date set of GeoVision IoT devices and injects commands into the SZSRVIPADDR parameter,” Akamai researcher Kyle Lefton said in a report shared with Hacker News.

Cybersecurity

The attack detected by the Web Security and Infrastructure Company was found to inject commands to download and run the ARM version of the Mirai malware called LZRD.

Vulnerabilities exploited by botnets include Hadoop Yarn vulnerabilities, CVE-2018-10561, and bugs that affect Digiever, highlighted in December 2024.

There is some evidence to suggest that the campaign is duplicated with the name of infected under the previously recorded activity.

“One of the most effective ways for cybercriminals to start assembling a botnet is to target fully secure and outdated firmware on older devices,” Lefton said.

“There are many hardware manufacturers that don’t issue patches to retired devices (in some cases, the manufacturers themselves may be discontinued).

Given that affected Geovision devices are unlikely to receive new patches, we recommend that users upgrade to a new model to protect against potential threats.

Samsung Magicinfo flaws were exploited in Mirai attacks

This disclosure comes when Arctic Wolf and the SANS Technology Institute warn about the active use of CVE-2024-7399 (CVSS score: 8.8).

Cybersecurity

This issue was addressed by Samsung in August 2024, but was weaponized by an attacker following the release of the Proof of Concept (POC) on April 30, 2025, and was then retrieved and executed a shell script responsible for downloading the botnet.

“Vulnerabilities allow for arbitrary file descriptions by uncertified users, and if the vulnerability is used to write specially created Javaserver page (JSP) files, it can ultimately lead to remote code execution,” Arctic Wolf said.

Users are encouraged to update their instances to version 21.1050 or later to mitigate potential operational impact.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenai has acquired AI coding startup Windsurf for $3 billion.
Next Article Promeet announces its Promeeters program to boost influencer impact and long-term revenue
user
  • Website

Related Posts

Researchers reveal Ecscape’s flaws in Amazon ECS that allow cross-task qualification theft

August 6, 2025

Fake VPN and spam blocker apps associated with vextrio used in ad fraud, subscription scams

August 6, 2025

AI slashes VCISO workloads by 68% as SMBS demands more – new report reveals

August 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Researchers reveal Ecscape’s flaws in Amazon ECS that allow cross-task qualification theft

Upwork is buying its way to staffing companies beyond freelancers

Fake VPN and spam blocker apps associated with vextrio used in ad fraud, subscription scams

Rivalry apps for men leak user personal data and driver’s license

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Google’s Genie 3: The Dawn of General AI?

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.