Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web

Posted on September 30, 2025September 30, 2025 By CWS

Veeam Backup & Replication, a cornerstone of many enterprises’ knowledge safety technique, has reportedly turn out to be the main target of a brand new exploit being provided on a clandestine market.

In accordance with a current itemizing, a vendor working below the deal with “SebastianPereiro” claims to own a remote-code-execution (RCE) exploit concentrating on particular Veeam 12.x builds.

Dubbed the “Bug of June 2025,” the exploit allegedly bypasses customary authentication mechanisms and grants full server management. Early indicators level to a vulnerability with CVE-2025-23121, although no formal proof-of-concept has been launched publicly.

The itemizing specifies that profitable exploitation requires solely any legitimate Energetic Listing account, considerably reducing the bar for risk actors who’ve gained area credentials by way of phishing or different lateral-movement methods.

Cost is ready at $7,000 in cryptocurrency, with patrons directed to non-public message the vendor.

Whereas the absence of a publicly shared proof-of-concept limits impartial verification, the potential impression on backup infrastructure is profound; compromised techniques could possibly be leveraged to exfiltrate, encrypt, or completely destroy backups.

ThreatMon analysts famous that enterprises operating Veeam Backup & Replication in combined Home windows-Linux environments may be particularly susceptible attributable to variations in logging and patch-management workflows.

Organizations delaying patches for take a look at or compliance causes may inadvertently prolong their publicity window, growing the danger of a profitable breach.

In response, safety groups are suggested to prioritize audit of Energetic Listing accounts with elevated privileges, confirm patch ranges on all Veeam servers, and monitor for anomalous service-account utilization.

An infection Mechanism

The exploit seems to leverage improper enter validation in Veeam’s REST API endpoint. An attacker authenticates with any AD account and submits a specifically crafted JSON payload to the /api/periods/startBackup endpoint, injecting shell instructions straight into the backup session creation logic.

A simplified proof-of-concept in PowerShell would possibly resemble:-

$uri = ”
$payload = @{
jobName = “WeeklyBackup”;
preScript = “powershell -Enc SQBuAG…” # Base64-encoded malicious command
} | ConvertTo-Json
Invoke-RestMethod -Uri $uri -Methodology Put up -Physique $payload -Credential (Get-Credential) -UseBasicParsing

This payload instructs the service to execute arbitrary PowerShell code below the context of the Veeam service account, granting the attacker elevated privileges and full management over backup jobs and repository contents.

Steady monitoring of API visitors and strict AD account hygiene are important to detecting and disrupting this assault vector.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Allegedly, Dark, Exploit, Listed, RCE, Sale, Threat, Veeam, Web

Post navigation

Previous Post: Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability
Next Post: Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location

Related Posts

SparkKitty Malware Attacking iOS and Android Users to Steal Gallery Images Cyber Security News
Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files Cyber Security News
Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System Cyber Security News
APT35 Hackers Attacking Government, Military Organizations to Steal Login Credentials Cyber Security News
Citrix Netscaler 0-day RCE Vulnerability Patched Cyber Security News
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News