Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns Of Rapid7 Velociraptor Vulnerability Exploited in Ransomware Attacks

Posted on October 15, 2025October 15, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) issued an pressing alert on October 14, 2025, highlighting a important vulnerability in Rapid7’s Velociraptor endpoint detection and response (EDR) device.

This flaw, stemming from incorrect default permissions, has already been weaponized by menace actors to execute arbitrary instructions and seize management of contaminated endpoints, amplifying dangers for organizations counting on the open-source safety platform.

Velociraptor, widespread amongst safety groups for its forensic capabilities and artifact assortment, suffers from a misconfiguration that enables authenticated customers with artifact assortment privileges to escalate their entry.

Based on CISA’s Identified Exploited Vulnerabilities (KEV) catalog, exploitation requires preliminary entry to the endpoint however can result in full takeover as soon as inside.

The vulnerability ties to CVE-2025-6264, which addresses improper dealing with of permissions, making it a basic case of default settings gone awry.

Rapid7 acknowledged the difficulty in a latest advisory, urging customers to replace to model 0.7.1 or later, the place stricter permission controls have been applied.

What makes this vulnerability notably alarming is its confirmed use in ransomware campaigns. Risk teams, together with these linked to LockBit and Conti variants, have exploited it to pivot from preliminary footholds into devastating network-wide infections.

Safety researchers at Mandiant reported cases the place attackers used Velociraptor’s personal artifact-gathering options towards defenders, injecting malicious payloads that evaded conventional detection.

In a single documented case from late September 2025, a mid-sized monetary agency misplaced endpoint visibility completely after ransomware operators commandeered the device, resulting in information exfiltration and encryption throughout 500 units.

This incident underscores a troubling pattern: adversaries more and more goal safety software program itself. By compromising EDR platforms like Velociraptor, attackers not solely neutralize defenses but additionally acquire reconnaissance benefits.

CISA emphasised that unpatched programs face heightened dangers, particularly in sectors like healthcare and demanding infrastructure, the place endpoint monitoring is important.

Mitigations

CISA recommends making use of Rapid7’s patches instantly, implementing least-privilege entry for artifact assortment, and adhering to Binding Operational Directive (BOD) 22-01 for cloud-based providers.

If mitigations show infeasible, discontinuing use of the affected product is suggested. The company set a due date of November 4, 2025, for federal companies to handle the vulnerability, signaling its severity.

Consultants warn that this exploit highlights the double-edged sword of open-source instruments: highly effective but susceptible to configuration pitfalls.

As ransomware evolves, mixing social engineering with technical exploits, defenders should prioritize rigorous permission audits.

Rapid7 has maintained its documentation with step-by-step hardening guides, however proactive monitoring stays key. With assaults surging 30% year-over-year per latest studies, this CISA warning serves as a name to fortify the very instruments meant to guard us.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, CISA, Exploited, Ransomware, Rapid7, Velociraptor, Vulnerability, Warns

Post navigation

Previous Post: BlackSuit Ransomware Actors Breached Corporate Environment, Including 60+ VMware ESXi hosts
Next Post: Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

Related Posts

Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption Cyber Security News
GitLab Security Update – Patch for Multiple Vulnerabilities in Community and Enterprise Edition Cyber Security News
Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Cyber Security News
Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems Cyber Security News
New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence Cyber Security News
Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack
  • YouTube Down for Users Globally – Google Confirms Outage
  • MCPTotal Launches to Power Secure Enterprise MCP Workflows
  • BreachLock Named Representative Provider for Penetration Testing as a Service (PTaaS) in New Gartner® Report
  • How SOCs Detect More Threats without Alert Overload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack
  • YouTube Down for Users Globally – Google Confirms Outage
  • MCPTotal Launches to Power Secure Enterprise MCP Workflows
  • BreachLock Named Representative Provider for Penetration Testing as a Service (PTaaS) in New Gartner® Report
  • How SOCs Detect More Threats without Alert Overload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News