Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web

Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web

Posted on September 30, 2025September 30, 2025 By CWS

Veeam Backup & Replication, a cornerstone of many enterprises’ knowledge safety technique, has reportedly turn out to be the main target of a brand new exploit being provided on a clandestine market.

In accordance with a current itemizing, a vendor working below the deal with “SebastianPereiro” claims to own a remote-code-execution (RCE) exploit concentrating on particular Veeam 12.x builds.

Dubbed the “Bug of June 2025,” the exploit allegedly bypasses customary authentication mechanisms and grants full server management. Early indicators level to a vulnerability with CVE-2025-23121, although no formal proof-of-concept has been launched publicly.

The itemizing specifies that profitable exploitation requires solely any legitimate Energetic Listing account, considerably reducing the bar for risk actors who’ve gained area credentials by way of phishing or different lateral-movement methods.

Cost is ready at $7,000 in cryptocurrency, with patrons directed to non-public message the vendor.

Whereas the absence of a publicly shared proof-of-concept limits impartial verification, the potential impression on backup infrastructure is profound; compromised techniques could possibly be leveraged to exfiltrate, encrypt, or completely destroy backups.

ThreatMon analysts famous that enterprises operating Veeam Backup & Replication in combined Home windows-Linux environments may be particularly susceptible attributable to variations in logging and patch-management workflows.

Organizations delaying patches for take a look at or compliance causes may inadvertently prolong their publicity window, growing the danger of a profitable breach.

In response, safety groups are suggested to prioritize audit of Energetic Listing accounts with elevated privileges, confirm patch ranges on all Veeam servers, and monitor for anomalous service-account utilization.

An infection Mechanism

The exploit seems to leverage improper enter validation in Veeam’s REST API endpoint. An attacker authenticates with any AD account and submits a specifically crafted JSON payload to the /api/periods/startBackup endpoint, injecting shell instructions straight into the backup session creation logic.

A simplified proof-of-concept in PowerShell would possibly resemble:-

$uri = ”
$payload = @{
jobName = “WeeklyBackup”;
preScript = “powershell -Enc SQBuAG…” # Base64-encoded malicious command
} | ConvertTo-Json
Invoke-RestMethod -Uri $uri -Methodology Put up -Physique $payload -Credential (Get-Credential) -UseBasicParsing

This payload instructs the service to execute arbitrary PowerShell code below the context of the Veeam service account, granting the attacker elevated privileges and full management over backup jobs and repository contents.

Steady monitoring of API visitors and strict AD account hygiene are important to detecting and disrupting this assault vector.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Allegedly, Dark, Exploit, Listed, RCE, Sale, Threat, Veeam, Web

Post navigation

Previous Post: Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability
Next Post: Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location

Related Posts

APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File Cyber Security News
76 Zero-day Vulnerabilities Uncovered by Hackers on Pwn2Own Automotive 2026 76 Zero-day Vulnerabilities Uncovered by Hackers on Pwn2Own Automotive 2026 Cyber Security News
CISA Warns Of Rapid7 Velociraptor Vulnerability Exploited in Ransomware Attacks CISA Warns Of Rapid7 Velociraptor Vulnerability Exploited in Ransomware Attacks Cyber Security News
Cloaking Platform 1Campaign Bypasses Google Ads Security Cloaking Platform 1Campaign Bypasses Google Ads Security Cyber Security News
Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered Cyber Security News
Fake CAPTCHA Attacks Fuel LummaStealer Malware Surge Fake CAPTCHA Attacks Fuel LummaStealer Malware Surge Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark