Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web

Posted on September 30, 2025September 30, 2025 By CWS

Veeam Backup & Replication, a cornerstone of many enterprises’ knowledge safety technique, has reportedly turn out to be the main target of a brand new exploit being provided on a clandestine market.

In accordance with a current itemizing, a vendor working below the deal with “SebastianPereiro” claims to own a remote-code-execution (RCE) exploit concentrating on particular Veeam 12.x builds.

Dubbed the “Bug of June 2025,” the exploit allegedly bypasses customary authentication mechanisms and grants full server management. Early indicators level to a vulnerability with CVE-2025-23121, although no formal proof-of-concept has been launched publicly.

The itemizing specifies that profitable exploitation requires solely any legitimate Energetic Listing account, considerably reducing the bar for risk actors who’ve gained area credentials by way of phishing or different lateral-movement methods.

Cost is ready at $7,000 in cryptocurrency, with patrons directed to non-public message the vendor.

Whereas the absence of a publicly shared proof-of-concept limits impartial verification, the potential impression on backup infrastructure is profound; compromised techniques could possibly be leveraged to exfiltrate, encrypt, or completely destroy backups.

ThreatMon analysts famous that enterprises operating Veeam Backup & Replication in combined Home windows-Linux environments may be particularly susceptible attributable to variations in logging and patch-management workflows.

Organizations delaying patches for take a look at or compliance causes may inadvertently prolong their publicity window, growing the danger of a profitable breach.

In response, safety groups are suggested to prioritize audit of Energetic Listing accounts with elevated privileges, confirm patch ranges on all Veeam servers, and monitor for anomalous service-account utilization.

An infection Mechanism

The exploit seems to leverage improper enter validation in Veeam’s REST API endpoint. An attacker authenticates with any AD account and submits a specifically crafted JSON payload to the /api/periods/startBackup endpoint, injecting shell instructions straight into the backup session creation logic.

A simplified proof-of-concept in PowerShell would possibly resemble:-

$uri = ”
$payload = @{
jobName = “WeeklyBackup”;
preScript = “powershell -Enc SQBuAG…” # Base64-encoded malicious command
} | ConvertTo-Json
Invoke-RestMethod -Uri $uri -Methodology Put up -Physique $payload -Credential (Get-Credential) -UseBasicParsing

This payload instructs the service to execute arbitrary PowerShell code below the context of the Veeam service account, granting the attacker elevated privileges and full management over backup jobs and repository contents.

Steady monitoring of API visitors and strict AD account hygiene are important to detecting and disrupting this assault vector.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Allegedly, Dark, Exploit, Listed, RCE, Sale, Threat, Veeam, Web

Post navigation

Previous Post: Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability
Next Post: Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location

Related Posts

AI Crawlers Reshape The Internet With Over 30% of Global Web Traffic Cyber Security News
New WireTap Attack Break Server SGX To Exfiltrate Sensitive Data Cyber Security News
Predictive Cyber Risk Analysis Using Aggregated Threat Intelligence Cyber Security News
New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers Cyber Security News
TaskHound Tool – Detects Windows Scheduled Tasks Running with Elevated Privileges and Stored Credentials Cyber Security News
North Korean Kimsuky and Lazarus Join Forces to Exploit Zero-Day Vulnerabilities Targeting Critical Sectors Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark