Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns Of Rapid7 Velociraptor Vulnerability Exploited in Ransomware Attacks

CISA Warns Of Rapid7 Velociraptor Vulnerability Exploited in Ransomware Attacks

Posted on October 15, 2025October 15, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) issued an pressing alert on October 14, 2025, highlighting a important vulnerability in Rapid7’s Velociraptor endpoint detection and response (EDR) device.

This flaw, stemming from incorrect default permissions, has already been weaponized by menace actors to execute arbitrary instructions and seize management of contaminated endpoints, amplifying dangers for organizations counting on the open-source safety platform.

Velociraptor, widespread amongst safety groups for its forensic capabilities and artifact assortment, suffers from a misconfiguration that enables authenticated customers with artifact assortment privileges to escalate their entry.

Based on CISA’s Identified Exploited Vulnerabilities (KEV) catalog, exploitation requires preliminary entry to the endpoint however can result in full takeover as soon as inside.

The vulnerability ties to CVE-2025-6264, which addresses improper dealing with of permissions, making it a basic case of default settings gone awry.

Rapid7 acknowledged the difficulty in a latest advisory, urging customers to replace to model 0.7.1 or later, the place stricter permission controls have been applied.

What makes this vulnerability notably alarming is its confirmed use in ransomware campaigns. Risk teams, together with these linked to LockBit and Conti variants, have exploited it to pivot from preliminary footholds into devastating network-wide infections.

Safety researchers at Mandiant reported cases the place attackers used Velociraptor’s personal artifact-gathering options towards defenders, injecting malicious payloads that evaded conventional detection.

In a single documented case from late September 2025, a mid-sized monetary agency misplaced endpoint visibility completely after ransomware operators commandeered the device, resulting in information exfiltration and encryption throughout 500 units.

This incident underscores a troubling pattern: adversaries more and more goal safety software program itself. By compromising EDR platforms like Velociraptor, attackers not solely neutralize defenses but additionally acquire reconnaissance benefits.

CISA emphasised that unpatched programs face heightened dangers, particularly in sectors like healthcare and demanding infrastructure, the place endpoint monitoring is important.

Mitigations

CISA recommends making use of Rapid7’s patches instantly, implementing least-privilege entry for artifact assortment, and adhering to Binding Operational Directive (BOD) 22-01 for cloud-based providers.

If mitigations show infeasible, discontinuing use of the affected product is suggested. The company set a due date of November 4, 2025, for federal companies to handle the vulnerability, signaling its severity.

Consultants warn that this exploit highlights the double-edged sword of open-source instruments: highly effective but susceptible to configuration pitfalls.

As ransomware evolves, mixing social engineering with technical exploits, defenders should prioritize rigorous permission audits.

Rapid7 has maintained its documentation with step-by-step hardening guides, however proactive monitoring stays key. With assaults surging 30% year-over-year per latest studies, this CISA warning serves as a name to fortify the very instruments meant to guard us.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, CISA, Exploited, Ransomware, Rapid7, Velociraptor, Vulnerability, Warns

Post navigation

Previous Post: BlackSuit Ransomware Actors Breached Corporate Environment, Including 60+ VMware ESXi hosts
Next Post: Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

Related Posts

UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports Cyber Security News
Hackers Exploiting Fake Battlefield 6 Popularity to Deploy Stealers and C2 Agents Hackers Exploiting Fake Battlefield 6 Popularity to Deploy Stealers and C2 Agents Cyber Security News
Criminal IP Showcases Threat Intelligence at RSAC 2026 Criminal IP Showcases Threat Intelligence at RSAC 2026 Cyber Security News
Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories Cyber Security News
Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine Cyber Security News
Authentication Coercion Attack Tricks Windows Machines into Revealing Credentials to Attack-controlled Servers Authentication Coercion Attack Tricks Windows Machines into Revealing Credentials to Attack-controlled Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark