Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Mirai Botnets Exploiting Wazuh Security Platform Vulnerability 

Posted on June 9, 2025June 9, 2025 By CWS

A vital distant code execution vulnerability affecting Wazuh servers has been exploited by Mirai botnets, Akamai warned on Monday.

Wazuh is a free and open supply safety platform designed for risk detection and response. Its builders introduced on February 10 that they’d patched CVE-2025-24016, an unsafe deserialization subject affecting servers working model 4.4.0 and newer, previous to 4.9.1, which features a patch.

“An unsafe deserialization vulnerability permits for distant code execution on Wazuh servers,” the builders defined. “The vulnerability will be triggered by anyone with API entry (compromised dashboard or Wazuh servers within the cluster) or, in sure configurations, even by a compromised agent.”

A proof-of-concept (PoC) exploit enabling DoS assaults was made public on the time of disclosure, and a PoC designed for arbitrary code execution was launched a number of days later.

In accordance with knowledge from Akamai’s honeypots, in-the-wild exploitation makes an attempt began in March. The cybersecurity agency has seen two Mirai campaigns exploiting CVE-2025-24016 to hack Wazuh servers. 

One Mirai botnet variant has focused the flaw since early March, with the exploit designed to fetch and execute a malicious shell script that serves as a downloader for the Mirai malware payload. The identical botnet additionally focused vulnerabilities in Hadoop YARN, and TP-Hyperlink and ZTE routers. 

The second Mirai variant focusing on CVE-2025-24016 was noticed in early Could, and a few proof means that the marketing campaign could have been aimed on the gadgets of Italian-speaking customers.

“The propagation of Mirai continues comparatively unabated, because it stays relatively easy to repurpose and reuse previous supply code to arrange or create new botnets. And botnet operators can typically discover success with merely leveraging newly revealed exploits,” Akamai warned.Commercial. Scroll to proceed studying.

Akamai has made obtainable indicators of compromise (IoC) to assist defenders detect and block these assaults.

Extra Mirai-related information comes from Kaspersky, which warned late final week that it had noticed a Mirai assault wave exploiting a distant command execution vulnerability tracked as CVE-2024-3721 to ensnare TBK DVR gadgets. 

Kaspersky too has made obtainable IoCs related to the Mirai assaults it has noticed. 

Associated: DanaBot Botnet Disrupted, 16 Suspects Charged

Associated: US Broadcasts Botnet Takedown, Prices In opposition to Russian Directors

Associated: Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet

Security Week News Tags:Botnets, Exploiting, Mirai, Platform, Security, Vulnerability, Wazuh

Post navigation

Previous Post: React Native Aria Packages Backdoored in Supply Chain Attack
Next Post: Guardz Banks $56M Series B for All-in-One SMB Security

Related Posts

743,000 Impacted by McLaren Health Care Data Breach Security Week News
Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management Security Week News
Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks Security Week News
TikTok Faces Fresh European Privacy Investigation Over China Data Transfers Security Week News
Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech Security Week News
Malicious NPM Packages Disguised as Express Utilities Allow Attackers to Wipe Systems Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 20 Best SNMP Monitoring Tools in 2025
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
  • VOIP-Based Botnet Attacking Routers Configured With Default Password
  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 20 Best SNMP Monitoring Tools in 2025
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
  • VOIP-Based Botnet Attacking Routers Configured With Default Password
  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News