A new cyberattack campaign using Mirai malware is actively targeting old D-Link DIR-823X routers. Attackers are exploiting a serious security flaw called CVE-2025-29635. This vulnerability allows remote command execution, meaning hackers can run commands on the router from outside. Security researchers from Akamai observed active attacks in March 2026. Although the flaw was disclosed earlier, this is the first confirmed real-world exploitation. Attackers send specially crafted requests to the vulnerable router endpoint and gain control. After access, they download a malicious script named dlink.sh and run it on the device. This script installs a Mirai-based malware called tuxnokill. Once infected, the router becomes part of a botnet controlled by attackers. The malware can then be used to launch large DDoS attacks, including TCP and UDP floods, which can disrupt websites and online services. Researchers also found that the same threat actors are targeting vulnerable TP-Link and ZTE routers using similar methods. The affected D-Link routers reached End of Life (EoL) in November 2024, which means they no longer receive security updates. Because of this, users may never receive an official patch. Devices left online can easily be hijacked and used in botnet attacks without the owner knowing. Users should replace unsupported routers with newer models that still receive updates. It is also important to disable remote administration if not needed, change default passwords, and check for suspicious configuration changes. This case clearly shows the danger of continuing to use outdated network devices after support ends.
Hackers are exploiting fake CAPTCHA pages to trick users into sending large volumes of international SMS messages, turning routine “prove you’re human” checks into a profitab...
A critical vulnerability has been identified in the Breeze Cache plugin for WordPress, actively exploited by attackers to upload arbitrary files without authentication. Tracked as ...
UNC6692 is a threat cluster conducting targeted social engineering campaigns by impersonating IT helpdesk staff through Microsoft Teams. Instead of exploiting software vulnerabilit...