Multiple WordPress Plugins Vulnerabilities
June 5, 2025Google Flaw Exposed Phone Numbers of Any User to Attackers
June 10, 2025Multiple WordPress Plugins Vulnerabilities
June 5, 2025Google Flaw Exposed Phone Numbers of Any User to Attackers
June 10, 2025Severity
High
Analysis Summary
A critical remote code execution (RCE) vulnerability in Wazuh servers, tracked as CVE-2025-24016, has been actively exploited by Mirai botnets, according to a warning issued by Security Researchers. Wazuh is a widely used open source platform for threat detection and response. The vulnerability, which stems from unsafe deserialization, affects versions 4.4.0 through 4.9.0 and was patched by developers on February 10, 2025.
This flaw allows remote attackers to execute arbitrary code on vulnerable Wazuh servers. Attackers can trigger the vulnerability via API access—either through a compromised Wazuh dashboard, a vulnerable cluster server, or in certain configurations, even through a compromised agent. At the time of disclosure, a proof-of-concept (PoC) for denial-of-service attacks was released, followed shortly by a PoC for remote code execution.
Researchers reported that exploitation in the wild began in March 2025. Their honeypots detected two separate Mirai botnet campaigns leveraging CVE-2025-24016. The first campaign, active since early March, involved an exploit that fetched and ran a malicious shell script acting as a downloader for the Mirai malware. This same botnet also targeted other systems with known vulnerabilities, such as Hadoop YARN and routers from TP-Link and ZTE.
A second campaign began in early May, with some indications it may have targeted Italian-speaking users specifically. Researchers emphasized that Mirai propagation continues largely unchecked, as its open-source nature makes it easy for attackers to adapt the code to exploit newly disclosed vulnerabilities.
To support defenders, researchers has released indicators of compromise (IoCs) related to these attacks, helping organizations detect and mitigate the threat posed by these Mirai-driven campaigns.
Impact
- Denial of Service
- Remote Code Execution
Indicators of Compromise
Domain Name
- resbot.online
- versioneonline.com
- web-app-on.com
- assicurati-con-linear.online
- webdiskwebdisk.webprocediweb.com
- continueoraweb.com
- ora-0-web.com
- adesso-online.com
- multi-canale.com
- eversioneweb.com
- gestisciweb.com
- nuklearcnc.duckdns.org
- jimmyudp-raw.xyz
- pangacnc.com
- neon.galaxias.cc
- cbot.galaxias.cc
IP
- 209.141.34.106
- 176.65.142.137
- 65.222.202.53
- 196.251.86.49
- 176.65.134.62
- 104.168.101.27
- 104.168.101.23
- 79.124.40.46
- 194.195.90.179
MD5
- 24080170cf5c4cc52cafed87001f14fb
- 583803c34c96bfab3f13af6394e3dcbe
- 49a58ddf3bedc37b61a8205bb3805413
- 70d36a466948c8c8e7571a2553b63cf6
- 5bae7ae73dd0167294a6252f45764a52
- 894b5bf0a636fef34219681a34966489
- 7d8818ae194f998cf60cf4f7984d8d13
- 5c45902514a7770de2b4d45ffb5ca1f0
- ef2bcdcd13c11e87a79b5db184603068
- 6e426247c1fdaaa09091b5ab4bb5a76b
- 8400e1a95f7a890da7ff9abbe59e084e
- c6d6c64d12cf9dd4474aa492697720af
- 655d3d7d35fff093109abdae45d85bdb
- 0a3b0cd349210c4488ef71e8b331ba47
SHA-256
- dece5eaeb26d0ca7cea015448a809ab687e96c6182e56746da9ae4a2b16edaa9
- 7b659210c509058bd5649881f18b21b645acb42f56384cbd6dcb8d16e5aa0549
- 64bd7003f58ac501c7c97f24778a0b8f412481776ab4e6d0e4eb692b08f52b0f
- 4c1e54067911aeb5aa8d1b747f35fdcdfdf4837cad60331e58a7bbb849ca9eed
- 811cd6ebeb9e2b7438ad9d7c382db13c1c04b7d520495261093af51797f5d4cc
- 90df78db1fb5aea6e21c3daca79cc690900ef8a779de61d5b3c0db030f4b4353
- 8a58fa790fc3054c5a13f1e4e1fcb0e1167dbfb5e889b7c543d3cdd9495e9ad6
- c9df0a2f377ffab37ede8f2b12a776a7ae40fa8a6b4724d5c1898e8e865cfea1
- 6614545eec64c207a6cc981fccae8077eac33a79f286fc9a92582f78e2ae243a
- 9d5c10c7d0d5e2ce8bb7f1d4526439ce59108b2c631dd9e78df4e096e612837b
- be4070b79a2f956e686469b37a8db1e7e090b9061d3dce73e3733db2dbe004f0
- e6cf946bd5a17909ae3ed9b1362cfaafa7afe02e74699dcbc3d515a6f964b0b0
- a0b47c781e70877ad4e721ba49f64fc0bc469e38750f070a232d12f03d9990bc
- 941a30698db98f29919cba80e66717c25592697b1447f3e96825730229d97549
SHA1
- 1a1cb8cf33616245da83fe1e5f4e3dd1918b076c
- d6a5231050931d452e572bcf12662482e776ab7e
- c80dcef582154d97d865c763707e8b5d1d95bba7
- 8474a1c1914551c45a8af3f6383d328a7884f175
- 0f9111ef955a4165086e85794209d6afa15c6d04
- 8b2c045d5ea55917ee18f1787f1fabce9e31d13d
- 8d40ec708d0828308f6a16926958a0f26a06d24b
- ced36bf32cc94b87353029113715af5d1dfc6581
- 5079f2b2cc9848ae27d59010f5d53573420703cf
- 99616f9eb80d8c0e2d91c12fa9db7c6ab94b8671
- 33bac66d1de6c64e5f34ba184de4842db48ac603
- 785b52e144577375abe4d1c785c451f60c423788
- e7c03309c93c99d195e7cd7984dee2c5c9cd90e3
- 4e1ed311021ce99a7556af05ca520a5569853eed
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Upgrade your operating system.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Immediately change default passwords on IoT devices to unique ones.
- Keep devices' firmware and software up to date to ensure that known vulnerabilities are patched.
- Implement firewalls and intrusion detection systems to monitor and control traffic to and from IoT devices.
- Employ tools that can identify unusual behavior or traffic patterns that might indicate a DDoS attack or a compromised device.
- Disable any unnecessary services or features on IoT devices to reduce their attack surface.
- Follow security best practices, such as disabling remote management if not needed and enabling security features provided by the device manufacturer.
- Deploy intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous or malicious network activity.
- Set up alerts for unusual traffic patterns that might indicate a DDoS attack or a compromised device.