Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Mirai Botnets Exploiting Wazuh Security Platform Vulnerability 

Posted on June 9, 2025June 9, 2025 By CWS

A vital distant code execution vulnerability affecting Wazuh servers has been exploited by Mirai botnets, Akamai warned on Monday.

Wazuh is a free and open supply safety platform designed for risk detection and response. Its builders introduced on February 10 that they’d patched CVE-2025-24016, an unsafe deserialization subject affecting servers working model 4.4.0 and newer, previous to 4.9.1, which features a patch.

“An unsafe deserialization vulnerability permits for distant code execution on Wazuh servers,” the builders defined. “The vulnerability will be triggered by anyone with API entry (compromised dashboard or Wazuh servers within the cluster) or, in sure configurations, even by a compromised agent.”

A proof-of-concept (PoC) exploit enabling DoS assaults was made public on the time of disclosure, and a PoC designed for arbitrary code execution was launched a number of days later.

In accordance with knowledge from Akamai’s honeypots, in-the-wild exploitation makes an attempt began in March. The cybersecurity agency has seen two Mirai campaigns exploiting CVE-2025-24016 to hack Wazuh servers. 

One Mirai botnet variant has focused the flaw since early March, with the exploit designed to fetch and execute a malicious shell script that serves as a downloader for the Mirai malware payload. The identical botnet additionally focused vulnerabilities in Hadoop YARN, and TP-Hyperlink and ZTE routers. 

The second Mirai variant focusing on CVE-2025-24016 was noticed in early Could, and a few proof means that the marketing campaign could have been aimed on the gadgets of Italian-speaking customers.

“The propagation of Mirai continues comparatively unabated, because it stays relatively easy to repurpose and reuse previous supply code to arrange or create new botnets. And botnet operators can typically discover success with merely leveraging newly revealed exploits,” Akamai warned.Commercial. Scroll to proceed studying.

Akamai has made obtainable indicators of compromise (IoC) to assist defenders detect and block these assaults.

Extra Mirai-related information comes from Kaspersky, which warned late final week that it had noticed a Mirai assault wave exploiting a distant command execution vulnerability tracked as CVE-2024-3721 to ensnare TBK DVR gadgets. 

Kaspersky too has made obtainable IoCs related to the Mirai assaults it has noticed. 

Associated: DanaBot Botnet Disrupted, 16 Suspects Charged

Associated: US Broadcasts Botnet Takedown, Prices In opposition to Russian Directors

Associated: Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet

Security Week News Tags:Botnets, Exploiting, Mirai, Platform, Security, Vulnerability, Wazuh

Post navigation

Previous Post: React Native Aria Packages Backdoored in Supply Chain Attack
Next Post: Guardz Banks $56M Series B for All-in-One SMB Security

Related Posts

vBulletin Vulnerability Exploited in the Wild Security Week News
In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware Security Week News
German Authorities Take Down Crypto Swapping Service eXch Security Week News
SolarWinds Makes Third Attempt at Patching Exploited Vulnerability Security Week News
Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection Security Week News
Hackers Target Casino Operator Boyd Gaming Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News