Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

West Indies players’ safety in IPL and PSL being monitored by CWI

May 14, 2025

Jojo’s Bizarre Adventure Inspires Model Alton Mason’s Outfit to Met Gala – Interest

May 13, 2025

Penguin Random House’s New Disney Licenses to Include Manga – News

May 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet
Cybersecurity

Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet

HarishBy HarishMay 6, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


May 06, 2025Ravie LakshmananInternet of Thing / Vulnerability

Threat actors have been observed actively exploiting security flaws in GeoVision end-of-life (EoL) Internet of Things (IoT) devices to corral them into a Mirai botnet for conducting distributed denial-of-service (DDoS) attacks.

The activity, first observed by the Akamai Security Intelligence and Response Team (SIRT) in early April 2025, involves the exploitation of two operating system command injection flaws (CVE-2024-6047 and CVE-2024-11120, CVSS scores: 9.8) that could be used to execute arbitrary system commands.

“The exploit targets the /DateSetting.cgi endpoint in GeoVision IoT devices, and injects commands into the szSrvIpAddr parameter,” Akamai researcher Kyle Lefton said in a report shared with The Hacker News.

Cybersecurity

In the attacks detected by the web security and infrastructure company, the botnet has been found injecting commands to download and execute an ARM version of the Mirai malware called LZRD.

Some of the vulnerabilities exploited by the botnet include a Hadoop YARN vulnerability, CVE-2018-10561, and a bug impacting DigiEver that was highlighted in December 2024.

There is some evidence to suggest that the campaign overlaps with previously recorded activity under the name InfectedSlurs.

“One of the most effective ways for cybercriminals to start assembling a botnet is to target poorly secured and outdated firmware on older devices,” Lefton said.

“There are many hardware manufacturers who do not issue patches for retired devices (in some cases, the manufacturer itself may be defunct).”

Given that the affected GeoVision devices are unlikely to receive new patches, it’s recommended that users upgrade to a newer model to safeguard against potential threats.

Samsung MagicINFO Flaw Exploited in Mirai Attacks

The disclosure comes as Arctic Wolf and the SANS Technology Institute warned of active exploitation of CVE-2024-7399 (CVSS score: 8.8), a path traversal flaw in Samsung MagicINFO 9 Server that could enable an attacker to write arbitrary files as system authority, to deliver the Mirai botnet.

Cybersecurity

While the issue was addressed by Samsung in August 2024, it has since been weaponized by attackers following the release of a proof-of-concept (PoC) on April 30, 2025, to retrieve and execute a shell script responsible for downloading the botnet.

“The vulnerability allows for arbitrary file writing by unauthenticated users, and may ultimately lead to remote code execution when the vulnerability is used to write specially crafted JavaServer Pages (JSP) files,” Arctic Wolf said.

Users are recommended to update their instances to version 21.1050 and later to mitigate potential operational impact.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleZendaya’s favorite co-star, Tom Holland, wasn’t with her at the Met Gala, but he’s never far
Next Article Google debuts an updated Gemini 2.5 Pro AI model ahead of I/O
Harish
  • Website
  • X (Twitter)

Related Posts

China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide

May 13, 2025

Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads

May 13, 2025

Deepfake Defense in the Age of AI

May 13, 2025

North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

May 13, 2025

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

May 13, 2025

Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers

May 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

West Indies players’ safety in IPL and PSL being monitored by CWI

May 14, 2025

Jojo’s Bizarre Adventure Inspires Model Alton Mason’s Outfit to Met Gala – Interest

May 13, 2025

Penguin Random House’s New Disney Licenses to Include Manga – News

May 13, 2025

CureIS Healthcare sues Epic Systems, alleging ‘scheme to destroy’

May 13, 2025
Don't Miss
Blockchain

How to Use tsUSDe on TON for Passive Dollar Yield in 2025

May 13, 20254 Mins Read

Looking for a way to earn passive income on your crypto without riding the rollercoaster…

$1B Bitcoin exits Coinbase in a day as analysts warn of supply shock

May 13, 2025

Brave adds Cardano support

May 13, 2025

Building a zero-knowledge trust layer for AI and Web3 — Interview with Polyhedra

May 13, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

AWS enters into ‘strategic partnership’ with Saudi Arabia-backed Humain

May 13, 2025

Tencent hires WizardLM team, a Microsoft AI group with an odd history

May 13, 2025

TikTok launches TikTok AI Alive, a new image-to-video tool

May 13, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.