Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

As the venture capital landscape changes, this executive focuses on overlooked founders

Hollywood isn’t happy with new Seedance 2.0 video generator

Designer Kate Burton collaborates with IBM and Fiducia AI for NYFW presentation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers deploy Samsung Magicinfo, Geovision IoT flaws and deploy Mirai Botnet
Identity

Hackers deploy Samsung Magicinfo, Geovision IoT flaws and deploy Mirai Botnet

userBy userMay 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 6, 2025Ravi LakshmananInternet of Things/Vulnerability

Threat actors have been observed to actively harness security flaws on Geovision’s End of the Apocalypse (EOL) Internet of Things (IoT) devices and surround them with Mirai BotNet to introduce distributed denial (DDOS) attacks.

Activities first observed by the Akamai Security Intelligence Unresponsive Team (SIRT) in early April 2025 include the exploitation of two operating system command injection flaws (CVE-2024-6047 and CVE-2024-11120, CVSS score: 9.8) that can be used to execute any system command.

“The exploit targets the endpoint of the /date set of GeoVision IoT devices and injects commands into the SZSRVIPADDR parameter,” Akamai researcher Kyle Lefton said in a report shared with Hacker News.

Cybersecurity

The attack detected by the Web Security and Infrastructure Company was found to inject commands to download and run the ARM version of the Mirai malware called LZRD.

Vulnerabilities exploited by botnets include Hadoop Yarn vulnerabilities, CVE-2018-10561, and bugs that affect Digiever, highlighted in December 2024.

There is some evidence to suggest that the campaign is duplicated with the name of infected under the previously recorded activity.

“One of the most effective ways for cybercriminals to start assembling a botnet is to target fully secure and outdated firmware on older devices,” Lefton said.

“There are many hardware manufacturers that don’t issue patches to retired devices (in some cases, the manufacturers themselves may be discontinued).

Given that affected Geovision devices are unlikely to receive new patches, we recommend that users upgrade to a new model to protect against potential threats.

Samsung Magicinfo flaws were exploited in Mirai attacks

This disclosure comes when Arctic Wolf and the SANS Technology Institute warn about the active use of CVE-2024-7399 (CVSS score: 8.8).

Cybersecurity

This issue was addressed by Samsung in August 2024, but was weaponized by an attacker following the release of the Proof of Concept (POC) on April 30, 2025, and was then retrieved and executed a shell script responsible for downloading the botnet.

“Vulnerabilities allow for arbitrary file descriptions by uncertified users, and if the vulnerability is used to write specially created Javaserver page (JSP) files, it can ultimately lead to remote code execution,” Arctic Wolf said.

Users are encouraged to update their instances to version 21.1050 or later to mitigate potential operational impact.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenai has acquired AI coding startup Windsurf for $3 billion.
Next Article Promeet announces its Promeeters program to boost influencer impact and long-term revenue
user
  • Website

Related Posts

Google collaborates with Russian actor suspect in failed malware attack on Ukrainian organization

February 13, 2026

Google connects China, Iran, Russia, and North Korea to coordinate defense sector cyber operations

February 13, 2026

UAT-9921 Deploys VoidLink malware targeting technology and financial sectors

February 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

As the venture capital landscape changes, this executive focuses on overlooked founders

Hollywood isn’t happy with new Seedance 2.0 video generator

Designer Kate Burton collaborates with IBM and Fiducia AI for NYFW presentation

India doubles state-backed venture capital, approves $1.1 billion fund

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.