Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet

Posted on May 6, 2025May 9, 2025 By CWS

Could 06, 2025Ravie LakshmananInternet of Factor / Vulnerability
Menace actors have been noticed actively exploiting safety flaws in GeoVision end-of-life (EoL) Web of Issues (IoT) gadgets to corral them right into a Mirai botnet for conducting distributed denial-of-service (DDoS) assaults.
The exercise, first noticed by the Akamai Safety Intelligence and Response Group (SIRT) in early April 2025, entails the exploitation of two working system command injection flaws (CVE-2024-6047 and CVE-2024-11120, CVSS scores: 9.8) that could possibly be used to execute arbitrary system instructions.
“The exploit targets the /DateSetting.cgi endpoint in GeoVision IoT gadgets, and injects instructions into the szSrvIpAddr parameter,” Akamai researcher Kyle Lefton stated in a report shared with The Hacker Information.

Within the assaults detected by the online safety and infrastructure firm, the botnet has been discovered injecting instructions to obtain and execute an ARM model of the Mirai malware known as LZRD.
Among the vulnerabilities exploited by the botnet embody a Hadoop YARN vulnerability, CVE-2018-10561, and a bug impacting DigiEver that was highlighted in December 2024.
There may be some proof to recommend that the marketing campaign overlaps with beforehand recorded exercise beneath the title InfectedSlurs.
“One of the efficient methods for cybercriminals to start out assembling a botnet is to focus on poorly secured and outdated firmware on older gadgets,” Lefton stated.
“There are various {hardware} producers who don’t difficulty patches for retired gadgets (in some circumstances, the producer itself could also be defunct).”
Provided that the affected GeoVision gadgets are unlikely to obtain new patches, it is advisable that customers improve to a more moderen mannequin to safeguard towards potential threats.
Samsung MagicINFO Flaw Exploited in Mirai Assaults
The disclosure comes as Arctic Wolf and the SANS Expertise Institute warned of lively exploitation of CVE-2024-7399 (CVSS rating: 8.8), a path traversal flaw in Samsung MagicINFO 9 Server that would allow an attacker to jot down arbitrary information as system authority, to ship the Mirai botnet.

Whereas the problem was addressed by Samsung in August 2024, it has since been weaponized by attackers following the discharge of a proof-of-concept (PoC) on April 30, 2025, to retrieve and execute a shell script accountable for downloading the botnet.
“The vulnerability permits for arbitrary file writing by unauthenticated customers, and should in the end result in distant code execution when the vulnerability is used to jot down specifically crafted JavaServer Pages (JSP) information,” Arctic Wolf stated.
Customers are advisable to replace their situations to model 21.1050 and later to mitigate potential operational affect.

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Botnet, Deploy, Exploit, Flaws, GeoVision, Hackers, IoT, MagicINFO, Mirai, Samsung

Post navigation

Previous Post: New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims
Next Post: NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware

Related Posts

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil The Hacker News
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools The Hacker News
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora The Hacker News
SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version The Hacker News
New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally The Hacker News
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News