Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

What is Zero Waste? FySelf Unveils the Eco-Friendly Lifestyle Revolution

Guardiola will receive another honor in Manchester. This is from that university

Republican proposal supported by Trump floats $1,000 baby bonds for families

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Two different botnets exploiting a vulnerability in Wazuh Server to launch a Mirai-based attack
Identity

Two different botnets exploiting a vulnerability in Wazuh Server to launch a Mirai-based attack

userBy userJune 9, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The current patched critical security flaws of the Wazur server are exploited by threat actors, dropping two different Mirai Botnet variants and using them to carry out distributed denial of service (DDOS) attacks.

Akamai, who first discovered the exploitation effort in late March 2025, said that the malicious campaign was targeting CVE-2025-24016 (CVSS score: 9.9).

Security flaws affecting all versions of server software, including 4.4.0 and above, were addressed in February 2025 with the release of 4.9.1. The Proof of Concept (POC) exploit was released around the same time the patch was released.

The problem is rooted in the Wazuh API, where the parameters of the distribution are serialized as JSON and are derelied using “as_wazuh_object” in the framework/wazuh/core/cluster/common.py file. Threat actors can weaponize vulnerabilities by injecting malicious JSON payloads and running arbitrary Python code remotely.

Web Infrastructure Company said it has discovered attempts to exploit CVE-2025-24016 by two different botnets. The attack was registered in early March and May 2025.

“This is the latest example of the timeline that botnet operators have adopted for their newly released CVEs to a constantly shrinking time,” security researchers Kyle Lefton and Daniel Messing said in a report shared with Hacker News.

Cybersecurity

In the first example, a successful exploit paves the way for running a shell script that acts as a downloader for Mirai Botnet payloads from an external server (176.65.134[.]62″) For various architectures. The malware sample is rated as a variant of Lzrd Mirai, which has been around since 2023.

It is also worth noting that LZRD has recently been deployed in attacks that utilize GeoVision End of Life (EOL) Mintern of Things (IoT) devices. However, Akamai told Hacker News that there is no evidence that these two clusters of activity are works of the same threat actor, given that LZRD is being used by countless botnet operators.

“A further infrastructure analysis for 176.65.134[.]62” and its associated domains have led to the discovery of other Mirai Botnet versions, including the LZRD variants named “Neon” and “Vision”, as well as updated versions of V3G4.

Other security flaws exploited in botnets include Hadoop Yarn flaws, TP-Link Archer AX21 (CVE-2023-1389), and remote code execution bugs on ZTE ZXV10 H108L routers.

The second botnet that abuses CVE-2025-24016 employs a similar strategy that uses a malicious shell script to provide another Mirai Botnet variant called Resbot (aka Resential).

“One of the interesting things we noticed about this botnet was the related language. It was spreading malware using all domains, all with Italian nomenclature,” the researchers said. “The language naming conventions may indicate campaigns that target devices owned and operated by Italian-speaking users, particularly those that.”

In addition to spreading over FTP to port 21 and performing Telnet scans, the botnet has been found to utilize a wide range of exploits targeting the Huawei HG532 router (CVE-2017-17215), RealTek SDK (CVE-2014-8361), and the TrueNlineLline Zyxel P660hn-T V1 Router. (CVE-2017-18368).

“The Mirai propagation continues relatively unabated as it remains fairly easy to reuse and reuse old source code to set up or create new botnets,” the researchers said. “And botnet operators can often be successful by simply leveraging newly released exploits.”

CVE-2025-24016 is far from the only vulnerability abused by the Mirai Botnet variant. In recent attacks, threat actors have also taken advantage of CVE-2024-3721, a moderately radical command injection vulnerability affecting TBK DVR-4104 and DVR-4216 digital video recording devices to join the botnet.

The vulnerability is used to trigger the execution of a shell script responsible for downloading Mirai Botnet from a remote server (“42.112.26[.]36”) and run it, but not before checking if it is currently running within a virtual machine or QEMU.

Russian cybersecurity company Kaspersky said infections are concentrated in China, India, Egypt, Ukraine, Russia, Turkey and Brazil, and have identified more than 50,000 exposed DVR devices online.

Cybersecurity

“The widespread use of malware targeting Linux-based systems, as well as the use of known security flaws on unpatched IoT devices and servers, leading to a considerable number of bots that constantly search the internet and infect devices.

Disclosures will be made as China, India, Taiwan, Singapore, Singapore, Japan, Malaysia, Hong Kong, Indonesia, South Korea and Bangladesh appeared as the most targeted countries in the APAC region in the first quarter of 2025, according to statistics shared by Stormwall.

“API flooding and carpet bombing are growing faster than traditional volumetric TCP/UDP attacks, encouraging businesses to adopt smarter and more flexible defenses,” the company said. “At the same time, the growing geopolitical tensions have driven a surge in attacks on the government system and Taiwan, highlighting the increased activity by hattitivisists and state-sponsored threat actors.”

And following a recommendation from the US Federal Bureau of Investigation (FBI), Badbox 2.0 botnets have infected millions of internet-connected devices, most of which are manufactured in China and are turned into housing commissions to promote criminal activity.

“Cybercriminals gain unauthorized access to their home networks by configuring their products with malicious software before they make a purchase, or by infecting their devices to download necessary applications, usually including backdoors, during the setup process,” the FBI said.

“The Badbox 2.0 botnet consists of millions of infected devices, providing free access to compromised home networks used for a variety of criminal activities, or maintaining numerous backdoors for proxy services exploited by cybercriminalists.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle fixes bugs that could reveal users’ private phone numbers
Next Article Vantage raises 720 million euros in the first ever euro ABS transaction backed by European data centres
user
  • Website

Related Posts

More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

June 9, 2025

Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

June 9, 2025

Do you think your IDP or CASB is hiding it? These five risks prove not to

June 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

What is Zero Waste? FySelf Unveils the Eco-Friendly Lifestyle Revolution

Guardiola will receive another honor in Manchester. This is from that university

Republican proposal supported by Trump floats $1,000 baby bonds for families

Apple redesigns its operating system with “LiquidGlass” on WWDC 25

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

IONQ acquires nearly $1.1 billion in British quantum startup Oxford Ionics

aixuspeed reports $500,000 in token commitments within the first 72 hours prior to sale

Vantage raises 720 million euros in the first ever euro ABS transaction backed by European data centres

Meta of lectures investing more than $100 billion in Silicon Valley’s top AI startups

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.