Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks

New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks

Posted on June 17, 2025June 17, 2025 By CWS

Jun 17, 2025Ravie LakshmananBotnet / Vulnerability
Cybersecurity researchers have known as consideration to a brand new marketing campaign that is actively exploiting a not too long ago disclosed vital safety flaw in Langflow to ship the Flodrix botnet malware.
“Attackers use the vulnerability to execute downloader scripts on compromised Langflow servers, which in flip fetch and set up the Flodrix malware,” Development Micro researchers Aliakbar Zahravi, Ahmed Mohamed Ibrahim, Sunil Bharti, and Shubham Singh stated in a technical report revealed right this moment.
The exercise entails the exploitation of CVE-2025-3248 (CVSS rating: 9.8), a lacking authentication vulnerability in Langflow, a Python-based “visible framework” for constructing synthetic intelligence (AI) purposes.

Profitable exploitation of the flaw might allow unauthenticated attackers to execute arbitrary code through crafted HTTP requests. It was patched by Langflow in March 2025 with model 1.3.0.
Final month, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) flagged the lively exploitation of CVE-2025-3248 within the wild, with the SANS Expertise Institute revealing that it detected exploit makes an attempt towards its honeypot servers.
The most recent findings from Development Micro present that risk actors are concentrating on unpatched internet-exposed Langflow situations leveraging a publicly-available proof-of-concept (PoC) code to conduct reconnaissance and drop a shell script downloader accountable for retrieving and executing the Flodrix botnet malware from “80.66.75[.]121:25565.”

As soon as put in, Flodrix units up communications with a distant server to obtain instructions over TCP to be able to launch distributed denial-of-service (DDoS) assaults towards goal IP addresses of curiosity. The botnet additionally helps connections over the TOR anonymity community.
“Since Langflow doesn’t implement enter validation or sandboxing, these payloads are compiled and executed throughout the server’s context, resulting in [remote code execution],” the researchers stated. “Based mostly on these steps, the attacker is probably going profiling all susceptible servers and makes use of the collected knowledge to determine high-value targets for future infections.”
Development Micro stated it recognized the unknown risk actors to be internet hosting totally different downloader scripts on the identical host used to fetch Flodrix, suggesting that the marketing campaign is present process lively improvement.

Flodrix is assessed to be an evolution of one other botnet known as LeetHozer that is linked to the Moobot group. The improved variant incorporates the power to discreetly take away itself, reduce forensic traces, and complicate evaluation efforts by obfuscating command-and-control (C2) server addresses and different necessary indicators.
“One other important change is the introduction of recent DDoS assault varieties, which are actually additionally encrypted, including an additional layer of obfuscation,” Development Micro stated. “The brand new pattern additionally notably enumerates the operating processes by opening /proc listing to entry all operating processes.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Attacks, Botnet, Bug, DDoS, Exploits, Flodrix, Langflow, Launch, RCE, Server, Variant

Post navigation

Previous Post: Recent Langflow Vulnerability Exploited by Flodrix Botnet
Next Post: Asus Armoury Crate Vulnerability Leads to Full System Compromise

Related Posts

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto The Hacker News
Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks The Hacker News
New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits The Hacker News
A Pragmatic Approach To NHI Inventories  A Pragmatic Approach To NHI Inventories  The Hacker News
Ghost Identities, Poisoned Accounts, & AI Agent Havoc Ghost Identities, Poisoned Accounts, & AI Agent Havoc The Hacker News
Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News