Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes

Posted on September 3, 2025September 3, 2025 By CWS

Risk actors are quickly weaponizing Hexstrike-AI, a not too long ago launched AI-powered offensive safety framework, to scan for and exploit zero-day CVEs in underneath ten minutes. 

Initially marketed as an offensive safety framework for pink groups, Hexstrike-AI’s structure has already been repurposed by malicious operators inside hours of its public launch.

Key Takeaways1. Hexstrike-AI automates zero-day exploits in underneath 10 minutes.2. It hyperlinks LLMs to 150+ instruments for resilient workflows.3. Quickly weaponized towards Citrix CVEs, driving pressing AI-driven defenses.

Hexstrike-AI Automates Exploits in Minutes

Checkpoint’s current evaluation reveals how synthetic intelligence (AI) can handle and simplify complicated assaults by coordinating many specialised brokers. This AI-driven system helps automate multi-step assaults extra effectively.

With Hexstrike-AI, that concept has change into operational. The framework stands on a FastMCP server core, binding large-language fashions (Claude, GPT, Copilot) to over 150 safety instruments through MCP decorators. 

AI brokers can invoke standardized features reminiscent of nmap_scan(goal, choices) and execute_exploit(cve_id, payload) with out human micromanagement. 

Darkish-web chatter confirmed that risk actors are testing Webshell deployments towards the freshly disclosed Citrix NetScaler ADC and Gateway CVEs CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424 inside hours of disclosure.

Hexstrike-AI’s MCP orchestration layer interprets high-level instructions, reminiscent of “exploit NetScaler,” into sequenced technical workflows. 

Every stage of reconnaissance, memory-handling exploitation, persistence through webshell, and exfiltration is dealt with by specialised MCP brokers, guaranteeing retry logic and automatic resilience. 

CheckPoint noticed that, to the underground posts, operators achieved unauthenticated distant code execution on weak home equipment and dropped internet shells in underneath ten minutes.

Darkish internet posts discussing HexStrike AI, shortly after its launch

The structure of Hexstrike-AI implements:

Abstraction Layer: Interprets imprecise operator intent into exact operate calls.

MCP Brokers: Autonomous servers bridging LLMs with instruments, orchestrating every part from nmap_scan and hydra_brute to customized NetScaler exploit modules.

Automation & Resilience: Constructed-in retry loops and failure restoration guarantee chained operations proceed with out human intervention.

Intent-to-Execution Translation: The execute_command API dynamically constructs and executes workflows primarily based on intent strings.

This mannequin mirrors educational projections of AI orchestration driving next-gen cyberattacks—now crystallized in Hexstrike-AI’s code.

Citrix’s August 26 advisories revealed three important NetScaler vulnerabilities. Historically, exploiting such reminiscence and access-control flaws demanded skilled reverse engineering and exploit writing. 

 Darkish internet submit claiming to have efficiently exploited Citrix CVEs utilizing HexStrike AI

Hexstrike-AI collapses that barrier, enabling parallelized scanning of 1000’s of IPs and dynamic adaptation of exploit parameters till success.

The time-to-exploit for CVE-2025-7775 has already been decreased from weeks to minutes, with webshell-equipped home equipment showing on underground markets.

Mitigations

Organizations should quicken patching cycles and implement adaptive, AI-driven detection programs. 

Static signatures alone is not going to suffice towards quickly orchestrated assaults. Monitoring dark-web intelligence for early indicators, implementing segmentation and least-privilege fashions, and integrating autonomous response playbooks are important. 

Defenders should sustain with the expansion of AI-powered offenses by means of telemetry correlation and machine-speed patch validation.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Day, Exploit, Hackers, HexstrikeAI, Leverage, Minutes, Tool, Vulnerabilities

Post navigation

Previous Post: AI-Powered Cybersecurity Tools Can Be Turned Against Themselves Through Prompt Injection Attacks
Next Post: New TinyLoader Malware Attacking Windows Users Via Network Shares and Fake Shortcuts Files

Related Posts

ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password Cyber Security News
Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices Cyber Security News
5 New Trends In Phishing Attacks On Businesses  Cyber Security News
Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life Cyber Security News
Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data Cyber Security News
Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets
  • South Korea Seeks to Arrest Dozens of Online Scam Suspects Repatriated From Cambodia
  • Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android
  • AWS Outage Impacts Amazon, Snapchat, Prime Video, Canva and More
  • SIM Farm Dismantled in Europe, Seven Arrested

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets
  • South Korea Seeks to Arrest Dozens of Online Scam Suspects Repatriated From Cambodia
  • Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android
  • AWS Outage Impacts Amazon, Snapchat, Prime Video, Canva and More
  • SIM Farm Dismantled in Europe, Seven Arrested

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News