Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco AsyncOS 0-Day Vulnerability Exploited in the Wild to run System-level Commands

Cisco AsyncOS 0-Day Vulnerability Exploited in the Wild to run System-level Commands

Posted on December 18, 2025December 18, 2025 By CWS

An lively marketing campaign exploiting a zero-day vulnerability in Cisco AsyncOS Software program, focusing on Safe Electronic mail Gateway (previously Electronic mail Safety Equipment, ESA) and Safe Electronic mail and Net Supervisor (previously Content material Safety Administration Equipment, SMA).

The assault, noticed since late November 2025 and publicly disclosed on December 10, permits attackers to run system-level instructions and plant a persistent Python backdoor dubbed “AquaShell.”

Talos attributes the operation with average confidence to UAT-9686, a Chinese language-nexus superior persistent menace (APT) actor. Overlaps in ways, strategies, procedures (TTPs), tooling, and infrastructure hyperlink UAT-9686 to teams like APT41 and UNC5174.

Notably, the customized internet implant AquaShell mirrors strategies adopted by refined Chinese language APTs for stealthy persistence.

The intrusion vector hits home equipment with non-standard configurations, as detailed in Cisco’s advisory. Attackers embed AquaShell into “/knowledge/internet/euq_webui/htdocs/index.py” through an encoded blob. This light-weight backdoor passively displays for unauthenticated HTTP POST requests, decodes payloads with a customized algorithm plus Base64, and executes shell instructions.

Compromise escalates with supplementary instruments: AquaTunnel, a GoLang ELF binary forked from open-source ReverseSSH, establishes reverse SSH tunnels for distant entry previous firewalls; Chisel, an open-source tunneler, proxies TCP/UDP site visitors over HTTP for inner pivoting; and AquaPurge, which scrubs logs by filtering out keyword-laden traces through egrep.

The Safe Electronic mail and Net Supervisor centralizes oversight of the ESA and Net Safety Equipment (WSA), together with quarantine, insurance policies, and reporting, making it a chief goal for electronic mail gateway disruptions.

Cisco urges prospects to evaluate the advisory for indicators of compromise (IOCs) and remediation.

Device/ComponentTypeValueDescription ​AquaTunnelSHA256 Hash2db8ad6e0f43e93cc557fbda0271a436f9f2a478b1607073d4ee3d20a87ae7efGoLang ELF reverse SSH tunnel for distant entry.AquaPurgeSHA256 Hash145424de9f7d5dd73b599328ada03aa6d6cdcee8d5fe0f7cb832297183dbe4caLog-clearing utility utilizing egrep to take away key phrases.ChiselSHA256 Hash85a0b22bd17f7f87566bd335349ef89e24a5a19f899825b4d178ce6240f58bfcOpen-source tunneling software for TCP/UDP proxying over HTTP.Attacker IPIP Address172.233.67[.]176Command-and-control infrastructure.Attacker IPIP Address172.237.29[.]147Command-and-control infrastructure.Attacker IPIP Address38.54.56[.]95Command-and-control infrastructure.

This marketing campaign underscores rising APT deal with electronic mail safety edges amid provide chain dangers.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, AsyncOS, Cisco, Commands, Exploited, Run, SYSTEMLevel, Vulnerability, Wild

Post navigation

Previous Post: Hackers Actively Attacking Cisco and Palo Alto Networks VPN Gateways to Gain Login Access
Next Post: NAKIVO v11.1 Introduces Stronger Protection for Virtual Environments

Related Posts

Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords Cyber Security News
Russian Hacking Groups Gamaredon and Turla Attacking Organizations to Deploy Kazuar Backdoor Russian Hacking Groups Gamaredon and Turla Attacking Organizations to Deploy Kazuar Backdoor Cyber Security News
New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware Cyber Security News
Mystery OAST With Exploit for 200 CVEs Leveraging Google Cloud to Launch Attacks Mystery OAST With Exploit for 200 CVEs Leveraging Google Cloud to Launch Attacks Cyber Security News
RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor Cyber Security News
Critical AdonisJS Vulnerability Allow Remote Attacker to Write Files On Server Critical AdonisJS Vulnerability Allow Remote Attacker to Write Files On Server Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News