Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Leveraging Windows and Linux Vulnerabilities in Real-world Attacks to Gain System Access

Posted on August 29, 2025August 30, 2025 By CWS

Cybersecurity groups worldwide have noticed a surge in refined campaigns exploiting each Home windows and Linux vulnerabilities in latest months to attain unauthorized system entry.

These assaults typically start with phishing emails or malicious internet content material designed to ship weaponized paperwork. As soon as opened, the embedded exploits goal unpatched vulnerabilities in generally used software program parts, permitting attackers to execute arbitrary code on sufferer machines.

As organizations wrestle to maintain tempo with patch administration, risk actors have intensified their deal with high-impact flaws that stay unaddressed in lots of environments.

Securelist researchers recognized that a number of long-standing vulnerabilities in Microsoft Workplace’s Equation Editor proceed to be a favourite preliminary entry vector.

CVE-2018-0802 and CVE-2017-11882, each distant code execution flaws within the Equation Editor part, stay closely exploited regardless of patches being out there for years.

As well as, CVE-2017-0199, a flaw affecting Workplace and WordPad, supplies one other path for payload supply.

These Workplace exploits are sometimes mixed with newer Home windows File Explorer and driver vulnerabilities—reminiscent of CVE-2025-24071, which allows NetNTLM credential theft through .library-ms recordsdata, and CVE-2024-35250, a ks.sys driver code execution challenge—to ascertain a foothold and escalate privileges.

Past Microsoft Workplace, attackers have additionally leveraged WinRAR’s archive-handling weaknesses. CVE-2023-38831 and the listing traversal flaw CVE-2025-6218 enable adversaries to position malicious recordsdata exterior the supposed extraction path, hijacking system configurations or dropping persistence backdoors.

On the Linux aspect, the Soiled Pipe vulnerability (CVE-2022-0847) stays a crucial favourite for privilege escalation, whereas CVE-2019-13272 and CVE-2021-22555 proceed for use to realize root entry on unpatched servers.

An infection Mechanism

A very insidious an infection mechanism combines Workplace-based supply with secondary exploitation of system drivers. Securelist analysts famous that attackers craft RTF paperwork containing shellcode that invokes Equation Editor by way of OLE objects.

As soon as the vulnerability triggers, shellcode downloads a two-stage payload: a small loader and a full-featured malware binary.

The loader leverages CVE-2025-24071 to reap NetNTLM hashes from incoming SMB connections, forwarding them to a C2 server.

The complete payload then exploits CVE-2024-35250 to load a malicious driver into kernel house, granting attackers unrestricted code execution.

This dual-exploit chain permits adversaries to bypass user-level defenses and deploy rootkits undetected.

Payload printed on-line (Supply – Securelist)

In lots of incidents, as soon as kernel-level management is achieved, attackers set up customized C2 frameworks—reminiscent of Sliver or Havoc—to keep up persistence.

These implants embrace in-memory safety to evade antivirus scans and use official Home windows companies to mix into regular processes.

By chaining publicly identified exploits, actors can quickly transfer from preliminary compromise to full system management with out writing suspicious recordsdata to disk.

Vulnerability Particulars:-

CVEDescriptionExploit TypeAffected PlatformCVE-2018-0802RCE in Workplace Equation EditorEmbedded OLE exploitWindowsCVE-2017-11882RCE in Workplace Equation EditorEmbedded OLE exploitWindowsCVE-2017-0199Control takeover through Workplace and WordPadScript-based doc exploitWindowsCVE-2023-38831Improper file dealing with in WinRARArchive code executionWindowsCVE-2025-24071NetNTLM credential theft through .library-ms filesCredential dumpingWindowsCVE-2024-35250Arbitrary code execution in ks.sys driverKernel driver exploitWindowsCVE-2022-0847Dirty Pipe privilege escalationPipe buffer overwriteLinuxCVE-2019-13272Improper privilege inheritance handlingPrivilege escalationLinuxCVE-2021-22555Heap overflow in NetfilterHeap-based overflowLinuxCVE-2025-6218Directory traversal in WinRARArchive path manipulationWindows

This consolidated view highlights the persistence of older vulnerabilities alongside newer flaws, underscoring the crucial want for well timed patching and complete defense-in-depth methods.

Organizations ought to prioritize updates for each person functions and system parts to mitigate the danger of those prevalent exploits in real-world assaults.

Enhance your SOC and assist your workforce shield your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Access, Actors, Attacks, Gain, Leveraging, Linux, RealWorld, System, Threat, Vulnerabilities, Windows

Post navigation

Previous Post: Google Confirms Workspace Accounts Also Hit in Salesforce–Salesloft Drift Data Theft Campaign
Next Post: Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign

Related Posts

Ransomware 2.0 How AI-Powered Attacks Are Evolving Cyber Security News
Threat Actor Mimo Attacking Magento CMS to Steal Card Details and Bandwidth Monetization Cyber Security News
Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Cyber Security News
BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware Cyber Security News
CISA Warns of Citrix RCE and Privilege Escalation Vulnerabilities Exploited in Attacks Cyber Security News
Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Seeks Researchers for 2026 iPhone Security Program
  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers
  • Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams
  • Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Seeks Researchers for 2026 iPhone Security Program
  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers
  • Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams
  • Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News