A significant vulnerability, CVE-2025-24016, affecting Wazuh Server is currently under active exploitation by threat actors. The bug was discovered by Akamai as a critical unsafe deserialization bug that allows remote code execution through the Wazuh API. Although a fix was released in February 2025 with version 4.9.1, attackers began leveraging the bug mere weeks after its public disclosure and the availability of a proof-of-concept. The ongoing attacks involve shell scripts that download various Mirai botnet payloads, including LZRD and Resbot variants, from attacker-controlled infrastructure, subsequently deploying them to compromised systems. The Mirai botnet variants are primarily targeting exposed IoT devices and servers. Exploitation efforts extend beyond Wazuh itself to include legacy platforms like TP-Link routers, Huawei systems, and Realtek SDKs. Evidence suggests a potential regional targeting focus on Italian-speaking users, indicated by specific domain naming conventions used in campaigns. The continued propagation of Mirai variants is facilitated by attackers reusing older source code and rapidly integrating new exploits, demonstrating a trend of accelerated exploitation following vulnerability disclosures. To mitigate the risk posed by these attacks, organizations must promptly patch all vulnerable Wazuh Server instances. Furthermore, deploying behavioral detection tools and employing robust network segmentation can aid in identifying botnet activity. Best practices also include restricting user privileges, regularly updating software, and diligently monitoring for indicators of compromise. Administrators should pay close attention to the rapid deployment of exploits, particularly after the public release of proof-of-concept code.
Security researchers have revealed a fresh series of cyber-espionage operations aimed at Indian government organizations, marked by the use of bespoke malware and trusted online se...
A new Embedded Systems Threat Matrix (ESTM) framework has been introduced for security strengthening of embedded systems that underpin critical infrastructure and defense technolog...
Security researchers disclosed multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), a widely used IT service management and ticketing solution. The flaws include re...