Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Routers Hacked for Rootkit Deployment

Posted on October 16, 2025October 16, 2025 By CWS

Older Cisco gadgets unpatched in opposition to a latest zero-day vulnerability have been contaminated with a rootkit in a brand new marketing campaign, Development Micro stories.

The exploited defect, tracked as CVE-2025-20352 (CVSS rating of seven.7), was patched in late September, when Cisco warned of its in-the-wild exploitation.

Described as a stack overflow situation within the Easy Community Administration Protocol (SNMP) of IOS and IOS XE gadgets, the bug permits low-privileged attackers to trigger a denial-of-service (DoS) situation and may be exploited by high-privileged attackers for distant code execution (RCE).

Now, Development Micro says it has noticed a menace actor exploiting the vulnerability to deploy a rootkit on older, weak gadgets, together with Cisco 9400, 9300, and legacy 3750G collection gadgets.

“The operation focused victims working older Linux methods that don’t have endpoint detection response options, the place they deployed Linux rootkits to cover exercise and evade blue-team investigation and detection,” Development Micro notes.

The marketing campaign has been dubbed Operation ZeroDisco, because the malware units a common password containing the phrase ‘disco’, a one-letter change from Cisco.

Along with CVE-2025-20352, the hackers used a modified exploit for CVE-2017-3881, a Telnet flaw resulting in RCE, that allowed reminiscence learn/write.

Towards 32-bit methods, the attackers used malicious SNMP packets to ship instructions to the weak gadgets, and relied on the Telnet exploit to acquire reminiscence learn/write at arbitrary addresses.Commercial. Scroll to proceed studying.

Towards 64-bit methods, the menace actors used the SNMP exploit to deploy the rootkit, after which logged in utilizing the common password and deployed a fileless backdoor. The attackers additionally linked totally different VLANs for lateral motion.

The rootkit, Development Micro explains, displays UDP packets despatched to any gadget port, even closed ones, which permits the attackers to configure or set off backdoor features. It additionally modifies IOSd reminiscence to arrange the common password that works throughout most authentication strategies.

It additionally hides running-config gadgets in reminiscence, permits the bypass of ACLs utilized to VTY (the digital interface on a Cisco gadget used for distant entry), can disable log historical past, and resets running-config write timestamps to cover adjustments.

“At present there isn’t a common automated device that may reliably decide whether or not a Cisco change has been efficiently compromised by the ZeroDisco operation. In the event you suspect a change is affected, we advocate contacting Cisco TAC instantly and asking the seller to help with a low-level investigation of firmware/ROM/boot areas,” Development Micro notes.

Associated: Cisco, Fortinet, Palo Alto Networks Units Focused in Coordinated Marketing campaign

Associated: Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Assaults

Associated: Microsoft Patches 173 Vulnerabilities, Together with Exploited Home windows Flaws

Associated: Subtle Malware Deployed in Oracle EBS Zero-Day Assaults

Security Week News Tags:Cisco, Deployment, Hacked, Rootkit, Routers

Post navigation

Previous Post: US Charges Cambodian Executive in Massive Crypto Scam and Seizes More Than $14 Billion in Bitcoin
Next Post: Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware

Related Posts

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks Security Week News
Microsoft Paid Out $17 Million in Bug Bounties in Past Year Security Week News
Legion Emerges From Stealth With $38 Million in Funding Security Week News
Ransomware Group Claims Attack on Belk Security Week News
Hackers Abuse ConnectWise to Hide Malware Security Week News
‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Gladinet Patches Exploited CentreStack Vulnerability
  • Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign
  • Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code
  • North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging
  • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Gladinet Patches Exploited CentreStack Vulnerability
  • Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign
  • Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code
  • North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging
  • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News