Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Mirai Botnets Exploiting Wazuh Security Platform Vulnerability 

Posted on June 9, 2025June 9, 2025 By CWS

A vital distant code execution vulnerability affecting Wazuh servers has been exploited by Mirai botnets, Akamai warned on Monday.

Wazuh is a free and open supply safety platform designed for risk detection and response. Its builders introduced on February 10 that they’d patched CVE-2025-24016, an unsafe deserialization subject affecting servers working model 4.4.0 and newer, previous to 4.9.1, which features a patch.

“An unsafe deserialization vulnerability permits for distant code execution on Wazuh servers,” the builders defined. “The vulnerability will be triggered by anyone with API entry (compromised dashboard or Wazuh servers within the cluster) or, in sure configurations, even by a compromised agent.”

A proof-of-concept (PoC) exploit enabling DoS assaults was made public on the time of disclosure, and a PoC designed for arbitrary code execution was launched a number of days later.

In accordance with knowledge from Akamai’s honeypots, in-the-wild exploitation makes an attempt began in March. The cybersecurity agency has seen two Mirai campaigns exploiting CVE-2025-24016 to hack Wazuh servers. 

One Mirai botnet variant has focused the flaw since early March, with the exploit designed to fetch and execute a malicious shell script that serves as a downloader for the Mirai malware payload. The identical botnet additionally focused vulnerabilities in Hadoop YARN, and TP-Hyperlink and ZTE routers. 

The second Mirai variant focusing on CVE-2025-24016 was noticed in early Could, and a few proof means that the marketing campaign could have been aimed on the gadgets of Italian-speaking customers.

“The propagation of Mirai continues comparatively unabated, because it stays relatively easy to repurpose and reuse previous supply code to arrange or create new botnets. And botnet operators can typically discover success with merely leveraging newly revealed exploits,” Akamai warned.Commercial. Scroll to proceed studying.

Akamai has made obtainable indicators of compromise (IoC) to assist defenders detect and block these assaults.

Extra Mirai-related information comes from Kaspersky, which warned late final week that it had noticed a Mirai assault wave exploiting a distant command execution vulnerability tracked as CVE-2024-3721 to ensnare TBK DVR gadgets. 

Kaspersky too has made obtainable IoCs related to the Mirai assaults it has noticed. 

Associated: DanaBot Botnet Disrupted, 16 Suspects Charged

Associated: US Broadcasts Botnet Takedown, Prices In opposition to Russian Directors

Associated: Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet

Security Week News Tags:Botnets, Exploiting, Mirai, Platform, Security, Vulnerability, Wazuh

Post navigation

Previous Post: React Native Aria Packages Backdoored in Supply Chain Attack
Next Post: Guardz Banks $56M Series B for All-in-One SMB Security

Related Posts

Firebase, Google Apps Script Abused in Fresh Phishing Campaigns Security Week News
German Authorities Take Down Crypto Swapping Service eXch Security Week News
US Student to Plead Guilty Over PowerSchool Hack Security Week News
Zscaler to Acquire MDR Specialist Red Canary Security Week News
Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 Security Week News
Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’
  • Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight
  • Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign
  • Top 5 Best Cybersecurity Companies Leading The Industry Right Now in 2025
  • United Natural Foods Suffers Cyberattack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’
  • Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight
  • Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign
  • Top 5 Best Cybersecurity Companies Leading The Industry Right Now in 2025
  • United Natural Foods Suffers Cyberattack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News