

Citrix Warns of Active Exploits on NetScaler Zero-Day Vulnerability
June 26, 2025
CVE-2025-6565 – NETGEAR WNCE3001 Vulnerability
June 27, 2025
Citrix Warns of Active Exploits on NetScaler Zero-Day Vulnerability
June 26, 2025
CVE-2025-6565 – NETGEAR WNCE3001 Vulnerability
June 27, 2025Severity
Meduim
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
f9381679d792fa51a2120edf6ed73265
8c55e7f277080e016d096def7171a7ea
7b8c43ff5287ec4c86921c06bff22ff0
SHA-256
d33f1d71c21fef8d2ec6637854918192e1c30ec737c4fb168a1581c39f54e539
c6b5457d0ea7da4288a3d3e052465d614d8ddd732682ebed0cd7e0619d426dee
ed0b15b82c2dba6a4516c5a0f5268a95fd7fe8aead707272a096d8ef47db92c0
SHA-1
6e6257b53eaa075d8b09061fec8a87f4ec9fb570
557b6c4b4fb642079fd209d872471f2c92962894
fb00fdb9cd78f260f5f26fc01aee6bb209d05877
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.