Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks

Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks

Posted on October 16, 2025October 16, 2025 By CWS

Oct 16, 2025Ravie LakshmananVulnerability / Linux
Cybersecurity researchers have disclosed particulars of a brand new marketing campaign that exploited a just lately disclosed safety flaw impacting Cisco IOS Software program and IOS XE Software program to deploy Linux rootkits on older, unprotected techniques.
The exercise, codenamed Operation Zero Disco by Pattern Micro, entails the weaponization of CVE-2025-20352 (CVSS rating: 7.7), a stack overflow vulnerability within the Easy Community Administration Protocol (SNMP) subsystem that might permit an authenticated, distant attacker to execute arbitrary code by sending crafted SNMP packets to a inclined gadget. The intrusions haven’t been attributed to any identified risk actor or group.
The shortcoming was patched by Cisco late final month, however not earlier than it was exploited as a zero-day in real-world assaults.

“The operation primarily impacted Cisco 9400, 9300, and legacy 3750G collection gadgets, with extra makes an attempt to use a modified Telnet vulnerability (primarily based on CVE-2017-3881) to allow reminiscence entry,” researchers Dove Chiu and Lucien Chuang stated.
The cybersecurity firm additionally famous that the rootkits allowed attackers to realize distant code execution and acquire persistent unauthorized entry by setting common passwords and putting in hooks into the Cisco IOS daemon (IOSd) reminiscence area. IOSd is run as a software program course of inside the Linux kernel.
One other notable side of the assaults is that they singled out victims operating older Linux techniques that would not have endpoint detection response options enabled, making it attainable to deploy the rootkits to be able to fly below the radar. As well as, the adversary is alleged to have used spoofed IPs and Mac e mail addresses of their intrusions.
Apart from CVE-2025-20352, the risk actors have additionally been noticed making an attempt to use a Telnet vulnerability that may be a modified model of CVE-2017-3881 in order to permit reminiscence learn/write at arbitrary addresses. Nonetheless, the precise nature of the performance stays unclear.

The identify “Zero Disco” is a reference to the truth that the implanted rootkit units a common password that features the phrase “disco” in it — a one-letter change from “Cisco.”
“The malware then installs a number of hooks onto the IOSd, which ends up in fileless elements disappearing after a reboot,” the researchers famous. “Newer swap fashions present some safety by way of Deal with Area Structure Randomization (ASLR), which reduces the success price of intrusion makes an attempt; nonetheless, it must be famous that repeated makes an attempt can nonetheless succeed.”

The Hacker News Tags:Attacks, Cisco, Deploy, Disco, Flaw, Hackers, Linux, Rootkits, SNMP

Post navigation

Previous Post: Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware
Next Post: CISA Warns Of Windows Improper Access Control Vulnerability Exploited In Attacks

Related Posts

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks The Hacker News
Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited The Hacker News
AI Browsers Vulnerable to Phishing Attacks: A Security Concern AI Browsers Vulnerable to Phishing Attacks: A Security Concern The Hacker News
Operation PowerOFF Disrupts Major DDoS Networks Operation PowerOFF Disrupts Major DDoS Networks The Hacker News
Microsoft Patches SharePoint Zero-Day and 168 Security Flaws Microsoft Patches SharePoint Zero-Day and 168 Security Flaws The Hacker News
Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark