A significant vulnerability, CVE-2025-24016, affecting Wazuh Server is currently under active exploitation by threat actors. The bug was discovered by Akamai as a critical unsafe deserialization bug that allows remote code execution through the Wazuh API. Although a fix was released in February 2025 with version 4.9.1, attackers began leveraging the bug mere weeks after its public disclosure and the availability of a proof-of-concept. The ongoing attacks involve shell scripts that download various Mirai botnet payloads, including LZRD and Resbot variants, from attacker-controlled infrastructure, subsequently deploying them to compromised systems. The Mirai botnet variants are primarily targeting exposed IoT devices and servers. Exploitation efforts extend beyond Wazuh itself to include legacy platforms like TP-Link routers, Huawei systems, and Realtek SDKs. Evidence suggests a potential regional targeting focus on Italian-speaking users, indicated by specific domain naming conventions used in campaigns. The continued propagation of Mirai variants is facilitated by attackers reusing older source code and rapidly integrating new exploits, demonstrating a trend of accelerated exploitation following vulnerability disclosures. To mitigate the risk posed by these attacks, organizations must promptly patch all vulnerable Wazuh Server instances. Furthermore, deploying behavioral detection tools and employing robust network segmentation can aid in identifying botnet activity. Best practices also include restricting user privileges, regularly updating software, and diligently monitoring for indicators of compromise. Administrators should pay close attention to the rapid deployment of exploits, particularly after the public release of proof-of-concept code.
On September 17, 2025, Adobe was in serious trouble with its Analytics platform due to an upgrade aimed at enhancing performance. This upgrade unintentionally introduced a bug in t...
A publicly released proof-of-concept for CVE-2025-32463 demonstrates a local privilege escalation in the Sudo utility that can lead to full root access when certain chroot-related ...
CYFIRMA researchers have discovered Yurei Ransomware, a new Go-based malware that encrypts files and spreads through SMB shares and removable drives. Designed for stealth and speed...