Threat analysts have uncovered the “Araneida Scanner,” a malicious tool based on a cracked version of Acunetix, a legitimate web vulnerability scanner. This tool is linked to illicit activities, including offensive reconnaissance and exploiting vulnerabilities in websites. Sold through platforms like Telegram and marketed for illegal purposes, the scanner has gained popularity among cybercriminals. Telegram channels associated with Araneida boast about significant exploits, claiming over 30,000 compromised websites in six months. Investigations have traced the scanner to a Turkish developer in Ankara, while other similar cracked tools suggest possible involvement of Chinese threat actors, such as APT41. The tool leverages a Windows executable for setup, enabling aggressive website scanning and identifying weaknesses for exploitation. Promoted within a Telegram community of nearly 500 members, the scanner facilitates website takeovers, credential theft, and other cybercrimes. Research indicates additional malicious tools hosted on IPs with Mandarin login portals and legacy Acunetix SSL certificates, raising suspicions of Chinese involvement. APT41, known for exploiting Acunetix in spear-phishing and SQL injection attacks, has a history of using such tools for espionage and reconnaissance. This highlights the persistent global misuse of legitimate cybersecurity technologies. Silent Push, in collaboration with Invicti (Acunetix’s parent company), confirmed that the genuine Acunetix scanner remains uncompromised. However, this incident emphasizes the risks posed by unauthorized cracked versions. Detailed threat intelligence feeds identifying domains and IPs tied to Araneida have been provided to mitigate risks. The incident underscores the dual-edged nature of cybersecurity tools, which, when misused, become potent instruments for malicious actors.
A recently disclosed vulnerability (CVE-2025-9708) in the Kubernetes C# client library allows attackers to perform man-in-the-middle (MiTM) attacks against the Kubernetes API serve...
A large-scale ad and click fraud scheme known as SlopAds has been uncovered, involving 224 Android apps that were downloaded over 38 million times across 228 countries. These apps ...
Multiple critical vulnerabilities have been discovered in Chaos Mesh, a widely used chaos engineering tool under the Cloud Native Computing Foundation. These issues, collectively l...