A Week of Botnet Campaigns and Exploit Spikes

January 24, 2025
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

This week, CISA has added a five-year-old jQuery vulnerability to its KEV catalog, highlighting its continued risk to systems.  Additionally, zero-day exploitation has been detected in SonicWall SMA1000 appliances, signaling active attacks targeting vulnerable systems. In a joint advisory, CISA and the FBI warned of an ongoing, sophisticated exploit chain targeting Ivanti Cloud Service Appliance, where multiple vulnerabilities are being leveraged by threat actors to orchestrate complex attacks.  

The botnet ecosystem remains highly active, with botnets like EnemyBot and Sysrv-K exploiting vulnerabilities in the Spring Cloud Gateway. Meanwhile, the IoT Reaper botnet has been exploiting a 12-year-old Cisco router vulnerability, underscoring the risks posed by legacy systems. Long-standing threats, including Mirai and Tsunami, continue to target outdated infrastructure using a nine-year-old flaw in the Eir D1000 Modem.

The Murdoc Botnet, a variant of the Mirai campaign, exploited vulnerabilities in AVTECH Cameras and Huawei HG532 routers to compromise IoT devices. Similarly, the AIRASHI Botnet targeted weaknesses in AVTECH IP cameras, LILIN DVRs, and Shenzhen TVT products to launch large-scale DDoS attacks. Additionally, the "Mikro Typo" botnet leveraged a global network of compromised MikroTik routers to send malicious emails.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2025-23006

A Pre-authentication Remote Code Execution Vulnerability has been discovered in SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) versions 12.4.3-02804 and prior. This zero-day vulnerability, discovered and reported by the Microsoft Threat Intelligence Center (MSTIC), allows attackers to execute arbitrary code on affected devices without any prior authentication. SonicWall's PSIRT has issued an urgent warning, as active exploitation of this flaw is likely underway.

CVE-2024-8190

An OS Command Injection Vulnerability in Ivanti Cloud Service Appliance enables remote authenticated attacker to execute arbitrary code. CISA and the FBI issued a joint advisory revealing that this vulnerability has been exploited as part of an attack chain, utilizing CVE-2024-8963 and CVE-2024-9380. This chain enables threat actors to gain initial access, execute remote code (RCE), steal credentials, and deploy web shells on compromised networks. This vulnerability was added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog in September 2024.  

CVE-2024-8963

A Path Traversal Vulnerability in Ivanti Cloud Service Appliance enables attackers to bypass administrative authentication and execute arbitrary commands. In a joint advisory, CISA and the FBI disclosed that this vulnerability is being actively exploited in conjunction with CVE-2024-8190, CVE-2024-9379 and CVE-2024-9380 as part of an attack chain. This exploitation enables threat actors to gain initial access, perform remote code execution (RCE), harvest credentials, and deploy web shells on targeted networks. This vulnerability was added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog in September 2024.  

CVE-2024-9379

An SQL Injection Vulnerability in the Ivanti Cloud Service Appliance enables a remote, authenticated attacker with administrator privileges to execute arbitrary SQL commands.  In a joint advisory, CISA and the FBI disclosed that this vulnerability is being actively exploited in conjunction with CVE-2024-8963 as part of an attack chain. This exploitation enables threat actors to gain initial access, perform remote code execution (RCE), harvest credentials, and deploy web shells on targeted networks. This vulnerability was added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog in October 2024.  

CVE-2024-9380  

A Command Injection Vulnerability in the Ivanti Cloud Service Appliance enables a remote, authenticated attacker with administrator privileges to execute arbitrary commands on the system. In a joint advisory, CISA and the FBI disclosed that this vulnerability is being actively exploited in conjunction with CVE-2024-8190, CVE-2024-8963 and CVE-2024-9379 as part of an attack chain. This exploitation enables threat actors to gain initial access, perform remote code execution (RCE), harvest credentials, and deploy web shells on targeted networks. This vulnerability was added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog in October 2024.  

CVE-2020-11023

A Cross-Site Scripting Vulnerability in jQuery versions 1.0.3 through 3.4.1, caused by appending HTML containing option elements, has been identified as a critical security risk. Despite being a five-year-old vulnerability, it remains significant due to its association with malware families, including OceanSalt, Auriga, Bangat, BISCUIT, MAPIGET, TARSIP, SEASALT, KURTON, and HELAUTO. Although this vulnerability was addressed in jQuery 3.5.0, this vulnerability was recently included in the CISA Known Exploited Vulnerabilities (KEV) Catalog, emphasizing its continued exploitation in cybersecurity incidents.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title Exploited – in the-wild CISA KEV
CVE-2024-47176 CUPS Medium Improper Input Validation Vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution True False
CVE-2023-38646 Metabase open source and Enterprise Critical Remote Code Execution Vulnerability in Metabase open source and Metabase Enterprise True False
CVE-2023-31192 SoftEther VPN Medium Information Disclosure Vulnerability in the ClientConnect() functionality of SoftEther VPN False False
CVE-2023-26801 LB-LINK Critical Command Injection Vulnerability in LB-LINK devices. True False
CVE-2023-23752 Joomla Medium Improper Access Control Vulnerability in Joomla! True True
CVE-2023-24488 ADC and Gateway Medium Cross-Site Scripting Vulnerability in Citrix ADC and Citrix Gateway. True False
CVE-2022-41040 Microsoft Exchange Server High Server-Side Request Forgery Vulnerability in Microsoft Exchange Server True True
CVE-2022-22947 Spring Cloud Gateway Critical Remote Code Execution Vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True True
CVE-2022-24847 GeoServer High Improper Input Validation Vulnerability in GeoServer leads to arbitrary code execution False False
CVE-2022-30023 Tenda Devices High Command Injection Vulnerability via the Ping function in Tenda Products False False
CVE-2022-25168 Hadoop Critical Command Injection Vulnerability in org.apache.hadoop.fs.FileUtil.unTarUsingTar in Apache Hadoop False False
CVE-2021-41773 HTTP Server High Path Traversal Vulnerability in Apache HTTP Server True True
CVE-2021-38647 Open Management Infrastructure Critical Remote Code Execution Vulnerability in Open Management Infrastructure True True
CVE-2021-27905 Solr Critical Server-Side Request Forgery Vulnerability in the Replication Handler in Apache-Solr. True False

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2022-22947 Spring Cloud Gateway Remote Code Execution Vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True EnemyBot
Sysrv-K
CVE-2016-10372 Eir D1000 modem Improper Protocol Access Control Vulnerability in Eir D1000 modem. True Bashlite
BrickerBot
Tsunami
Mirai
CVE-2013-2678 Cisco Linksys E4200 1.0.05 Build 7 routers Local File Inclusion Vulnerability in Cisco Linksys E4200 1.0.05 Build 7 routers leads to obtain sensitive information or execute arbitrary code True IoTReaper

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.    

CVE-2024-7029 and CVE-2017-17215

The Qualys Threat Research Unit has uncovered a significant, ongoing operation within the Mirai campaign, known as the Murdoc Botnet. This variant targets vulnerabilities in AVTECH Cameras and Huawei HG532 routers, exploiting them to gain initial access to Internet of Things (IoT) devices. Active since at least July 2024, the campaign has infected over 1,370 systems, with most victims located in Malaysia, Mexico, Thailand, Indonesia, and Vietnam. The botnet uses known security flaws to compromise devices and deploy its next-stage payload through a shell script.  

CVE-2023-30799

A Privilege Escalation Vulnerability in MikroTik RouterOS has been exploited to create a global botnet of approximately 13,000 compromised MikroTik routers. Codenamed "Mikro Typo," the campaign leverages misconfigured DNS records to bypass email protection measures, enabling malicious emails to appear as though they originate from legitimate domains. According to Infoblox researcher David Brunsdon, the botnet has been used in spam campaigns, with a notable instance in late November 2024 involving freight invoice-themed lures to deliver malicious ZIP archive payloads. While the initial access vector remains unclear, the operation affects multiple firmware versions of MikroTik routers, highlighting the risks of unpatched vulnerabilities and misconfigured devices.  

AIRASHI Botnet powers large-scale DDoS attacks

Threat actors are actively exploiting an undisclosed zero-day vulnerability in Cambium Networks cnPilot routers to deploy a variant of the AISURU botnet, known as AIRASHI, to carry out distributed denial-of-service (DDoS) attacks. These attacks, active since June 2024 according to QiAnXin XLab, rely on an unpatched security flaw, with details intentionally withheld to prevent further abuse. The AIRASHI Botnet also exploits multiple known vulnerabilities in devices such as AVTECH IP cameras, LILIN DVRs, and Shenzhen TVT products to enhance its impact. Most of the compromised devices are in Brazil, Russia, Vietnam, and Indonesia, while the botnet’s DDoS campaigns primarily target China, the United States, Poland, and Russia.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2024-7029 Critical Command Injection Vulnerability in AVTECH SECURITY Corporation IP camera AVM1203 firmware No Murdoc Botnet False
CVE-2023-28771 Critical OS Command Injection Vulnerability in multiple firmware versions of Zyxel ZyWALL/USG series Yes AIRASHI Botnet False
CVE-2023-30799 Critical Improper Privilege Management Vulnerability in MikroTik RouterOS Yes Mikro Typo False
CVE-2022-3573 Medium Reflected Cross-Site Scripting Vulnerability in GitLab CE/EE Yes AIRASHI Botnet False
CVE-2022-40005 High Authenticated Command Injection Vulnerability in Intelbras WiFiber Yes AIRASHI Botnet False
CVE-2022-44149 High OS Command Injection Vulnerability in web service on Nexxt Amp300 ARN02304U8 42.103.1.5095 and 80.103.2.5045 devices No AIRASHI Botnet False
CVE-2020-8515 Critical Remote Code Execution Vulnerability in DrayTek Vigor2960, Vigor3900, Vigor300B Yes AIRASHI Botnet False
CVE-2020-25499 High OS Command Injection Vulnerability in TOTOLINK A3002RU-V2.0.0 B20190814.1034 No AIRASHI Botnet False
CVE-2018-14558 Critical Command Injection Vulnerability in Tenda AC7 devices No AIRASHI Botnet False
CVE-2017-5259 High Privilege Escalation Vulnerability in Cambium Networks cnPilot firmware v4.3.2-R4 via web shell Yes AIRASHI Botnet False
CVE-2017-17215 High Remote Code Execution Vulnerability in Huawei HG532 Yes Murdoc Botnet False
CVE-2016-20016 Critical Remote Code Execution Vulnerability in MVPower CCTV DVR models No AIRASHI Botnet False
CVE-2013-3307 High Command Injection Vulnerability in Linksys e1000 routers No AIRASHI Botnet False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of Vulnerability Product Reference
CVE-2025-45186 Improper Access Control SuiteCRM Resource
CVE-2025-0411 Protection Mechanism Failure 7-Zip Resource
CVE-2025-0574 Memory Corruption Sante PACS Server Resource
CVE-2024-9042 Code Execution Kubernetes Windows Nodes Resource
CVE-2024-55647 Reflected Cross-Site Scripting Fedora Moodle Resource

External References

  1. https://www.cisa.gov/news-events/alerts/2025/01/23/cisa-adds-one-known-exploited-vulnerability-catalog  
  2. https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a  
  3. https://www.cisa.gov/news-events/alerts/2025/01/22/cisa-and-fbi-release-advisory-how-threat-actors-chained-vulnerabilities-ivanti-cloud-service  
  4. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002  
  5. https://blog.qualys.com/vulnerabilities-threat-research/2025/01/21/mass-campaign-of-murdoc-botnet-mirai-a-new-variant-of-corona-mirai  
  6. https://blogs.infoblox.com/threat-intelligence/one-mikro-typo-how-a-simple-dns-misconfiguration-enables-malware-delivery-by-a-russian-botnet/  
  7. https://blog.xlab.qianxin.com/large-scale-botnet-airashi-en/

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports