Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Routers Hacked for Rootkit Deployment

Posted on October 16, 2025October 16, 2025 By CWS

Older Cisco gadgets unpatched in opposition to a latest zero-day vulnerability have been contaminated with a rootkit in a brand new marketing campaign, Development Micro stories.

The exploited defect, tracked as CVE-2025-20352 (CVSS rating of seven.7), was patched in late September, when Cisco warned of its in-the-wild exploitation.

Described as a stack overflow situation within the Easy Community Administration Protocol (SNMP) of IOS and IOS XE gadgets, the bug permits low-privileged attackers to trigger a denial-of-service (DoS) situation and may be exploited by high-privileged attackers for distant code execution (RCE).

Now, Development Micro says it has noticed a menace actor exploiting the vulnerability to deploy a rootkit on older, weak gadgets, together with Cisco 9400, 9300, and legacy 3750G collection gadgets.

“The operation focused victims working older Linux methods that don’t have endpoint detection response options, the place they deployed Linux rootkits to cover exercise and evade blue-team investigation and detection,” Development Micro notes.

The marketing campaign has been dubbed Operation ZeroDisco, because the malware units a common password containing the phrase ‘disco’, a one-letter change from Cisco.

Along with CVE-2025-20352, the hackers used a modified exploit for CVE-2017-3881, a Telnet flaw resulting in RCE, that allowed reminiscence learn/write.

Towards 32-bit methods, the attackers used malicious SNMP packets to ship instructions to the weak gadgets, and relied on the Telnet exploit to acquire reminiscence learn/write at arbitrary addresses.Commercial. Scroll to proceed studying.

Towards 64-bit methods, the menace actors used the SNMP exploit to deploy the rootkit, after which logged in utilizing the common password and deployed a fileless backdoor. The attackers additionally linked totally different VLANs for lateral motion.

The rootkit, Development Micro explains, displays UDP packets despatched to any gadget port, even closed ones, which permits the attackers to configure or set off backdoor features. It additionally modifies IOSd reminiscence to arrange the common password that works throughout most authentication strategies.

It additionally hides running-config gadgets in reminiscence, permits the bypass of ACLs utilized to VTY (the digital interface on a Cisco gadget used for distant entry), can disable log historical past, and resets running-config write timestamps to cover adjustments.

“At present there isn’t a common automated device that may reliably decide whether or not a Cisco change has been efficiently compromised by the ZeroDisco operation. In the event you suspect a change is affected, we advocate contacting Cisco TAC instantly and asking the seller to help with a low-level investigation of firmware/ROM/boot areas,” Development Micro notes.

Associated: Cisco, Fortinet, Palo Alto Networks Units Focused in Coordinated Marketing campaign

Associated: Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Assaults

Associated: Microsoft Patches 173 Vulnerabilities, Together with Exploited Home windows Flaws

Associated: Subtle Malware Deployed in Oracle EBS Zero-Day Assaults

Security Week News Tags:Cisco, Deployment, Hacked, Rootkit, Routers

Post navigation

Previous Post: US Charges Cambodian Executive in Massive Crypto Scam and Seizes More Than $14 Billion in Bitcoin
Next Post: Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware

Related Posts

Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign Security Week News
1.2 Million Impacted by WestJet Data Breach Security Week News
Two Scattered Spider Suspects Arrested in UK; One Charged in US Security Week News
Adidas Data Breach Linked to Third-Party Vendor Security Week News
JPMorgan to Invest up to $10 Billion in US Companies with Crucial Ties to National Security Security Week News
Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark