Malware Resurgence, Espionage Campaigns Dominate the Week

August 29, 2025
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

The week's threat activity underscored a rapidly evolving landscape, with new KEV additions, and state-backed espionage operations targeting critical industries.  This week, CISA expanded its KEV catalog with four high-risk vulnerabilities; three impacting Citrix NetScaler and Session Recording and one targeting the widely used Git version control system, underscoring the growing urgency for switch patch management.  

Botnet activity has seen a sharp surge, with EnemyBot, Sysrv-k, Andoryu, and Androxgh0st exploiting flaws in GitLab, cloud gateways, and PHP-based applications, while IoT botnets such as Mirai, Bashlite, Tsunami, and BrickerBot aggressively targeted EirD1000 routers to establish persistence and enable lateral movement highlighting a widening attack surface across both enterprise and consumer networks.

From stealthy malware to state-backed intrusions, recent campaigns show rising threats against critical industries and infrastructure, underscoring the need for proactive defense. Fortinet FortiGuard Labs flagged renewed Gayfemboy malware activity exploiting flaws in DrayTek, TP-Link, Raisecom, and Cisco, while CrowdStrike linked MURKY PANDA to cloud-based espionage with zero-days and revealed that Glacial Panda is targeting telecoms to steal call records via privilege escalation flaws.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2025-7775
A Memory Overflow Vulnerability in Citrix NetScaler allows for remote code execution and potential denial-of-service attacks. Exploitation is possible under specific conditions, including configurations where NetScaler is deployed as a Gateway, AAA virtual server, load balancer with IPv6 bindings, or cache redirection server with type HDX. As of August 26, 2025, Cloud Software Group, confirmed that the flaw has been exploited as a zero-day in the wild against unpatched appliances. With no available mitigations, the vendor strongly urged customers to upgrade to fixed firmware versions immediately. The vulnerability has also been added to the CISA's Known Exploited Vulnerabilities (KEV) catalog, underscoring the critical need for rapid remediation.

CVE-2025-48384
A Link Following Vulnerability has been identified in Git, one of the most widely used distributed version control system that underpins both open-source and enterprise software development by managing source code at scale. With a high CVSS Score of 8.0, this flaw arises from Git's inconsistent handling of carriage return (CR) and line feed (LF) characters in configuration files. Specifically, a mismatch between how Git reads and writes these values can be exploited by attackers, enabling malicious manipulation of configuration paths and file redirections. This vulnerability, now added to the CISA KEV catalog, poses a serious risk as a publicly available proof-of-concept (PoC) increases the likelihood of active exploitation in real-world environments.

CVE-2024-8068  
An Improper Privilege Management Vulnerability has been discovered in Citrix Session Recording that enables privilege escalation to the NetworkService Account potentially allowing an attacker to gain elevated access within the environment. Citrix addressed the issue in November 2024 by releasing hotfixes across both the Current Release (CR) and Long Term Service Release (LTSR) branches as part of its routine security updates. According to research by watchtower, the root cause lies in the Session Recording component, a Windows service that handles recording files received from endpoints with session recording enabled. Successful exploitation requires the attacker to be an authenticated user within the same Windows Active Directory domain as the recording server. With a public proof-of-concept (PoC) available, the vulnerability recently added to the CISA KEV catalog, the likelihood of exploitation in enterprise environments is significantly elevated.

CVE-2024-8069
A Deserialization of Untrusted Data Vulnerability in the Citrix Session Recording, enables remote code execution under the privileges of the NetworkService account. The flaw originates in the Session Recording component, a Windows service responsible for processing session recording files received from endpoints with recording enabled. Exploitation requires the attacker to be an authenticated user within the same Windows Active Directory domain as the recording server. Citrix had already addressed this issue in November 2024 through hotfixes issued for both Current Release (CR) and Long Term Service Release (LTSR) branches as part of its security updates. With a public proof-of-concept (PoC) available and its recent inclusion in CISA KEV catalog, the risk of exploitation has significantly increased, underscoring the urgency for organizations to verify timely patch deployment.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title Exploited – in the-wild CISA KEV
CVE-2024-47176 CUPS Medium Improper Input Validation Vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution True False
CVE-2024-4577 PHP-CGI on Windows High Critical Argument Injection Vulnerability in PHP on Windows servers True True
CVE-2024-3721 TBK DVR Devices Medium OS Command Injection Vulnerability in TBK DVR-4104 and DVR-4216 up to 20240412 False False
CVE-2024-1709 ConnectWise ScreenConnect Critical Authentication Bypass Vulnerability in ConnectWise ScreenConnect through 23.9.7 leads to sensitive information disclosure True True
CVE-2023-38646 Metabase open source and Enterprise Critical Remote Code Execution Vulnerability in Metabase open source and Metabase Enterprise True False
CVE-2023-26801 LB-LINK Critical Command Injection Vulnerability in LB-LINK devices. True False
CVE-2022-34045 Wavlink devices Critical Hardcoded Encryption/Decryption Key Vulnerability in Wavlink WN530HG4 M30HG4.V5030.191116 False False
CVE-2022-30075 TP-Link Router High Improper Validation Vulnerability in TP-Link Router leads to remote code execution True False
CVE-2022-41040 Microsoft Exchange Server High Server-Side Request Forgery Vulnerability in Microsoft Exchange Server True True

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2022-22947 Spring Cloud Gateway Remote Code Execution Vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True EnemyBot
Sysrv-K
CVE-2021-22205 Gitlab-Exiftool Remote Code Execution Vulnerability in Gitlab-Exiftool True Andoryu
CVE-2017-9841 Util/PHP/eval-stdin.php in PHPUnit Arbitrary PHP Code Execution Vulnerability in Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 True AndroxGh0st
CVE-2016-10372 Eir D1000 modem Improper Protocol Access Control Vulnerability in Eir D1000 modem. True Bashlite
BrickerBot
Tsunami
Mirai

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.      

The resurgence of Gayfemboy botnet
Fortinet FortiGuard Labs has been tracking a stealthy malware strain that exploits a range of vulnerabilities to infiltrate systems. Initially disclosed by a Chinese cybersecurity firm under the name "Gayfemboy", the malware resurfaced in July 2025 with renewed activity, this time targeting vulnerabilities across multiple vendors including DrayTek, TP-Link, Raisecom, and Cisco. FortiGuard observed that the related payload exhibited signs of evolution in both form and behavior, enabling exploitation of several products such as exhibited signs of evolution in both form and behavior, enabling exploitation of several products such as DrayTek Vigor2960, Vigor3900, Vigor300B; TP-Link Archer AX21; Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300; and Cisco ISE and ISE-PIC. The campaign has been observed spanning Brazil, Mexico, the United States, Germany, France, Switzerland, Israel, and Vietnam, with its scope extending across critical sectors such as Manufacturing, Technology, Construction, and Media/Communications. While Gayfemboy inherits structural elements from Mirai, it introduces notable modifications that significantly enhance both its complexity and ability to evade detection. This evolution reflects the growing sophistication of modern malware campaigns and underscores the urgent need for proactive, intelligence-driven defense strategies.  

CrowdStrike Warns of MURKY PANDA Operations
CrowdStrike's Counter Adversary Operations has identified ongoing cyberespionage activity linked to MURKY PANDA, a China-nexus threat group active since at least 2023. The adversary has primarily targeted government, technology, academic, legal and professional services organizations in North America, often exploiting internet-facing appliances and rapidly weaponizing both n-day and zero-day vulnerabilities, including CVE-2023-3519 in Citrix NetScaler ADC and Gateway. The group's operations, closely aligned with espionage campaigns tracked by industry as Silk Typhoon, appear to be intelligence-driven, with past incidents involving the exfiltration of emails and sensitive documents. By targeting cloud environments and their supply chains, MURKY PANDA poses a sustained and significant threat to organizations handling high-value information.

Rise of Glacial Panda
CrowdStrike reports a 130% rise in nation-state activity targeting the telecommunications sector, driven by the intelligence value of such networks. The Chinese-linked actor Glacial Panda has conducted intrusions across multiple countries, focusing on Linux-based and legacy telecom systems. The group exploits internet-facing servers, weak credentials, and known vulnerabilities like CVE-2016-5195 (Dirty COW) and CVE-2021-4034 (PwnKit), while deploying trojanized OpenSSH components called ShieldSlide to capture credentials and maintain stealthy backdoor access. This activity underscores the critical need for telecom organizations to strengthen system hardening, patch management, and continuous monitoring to mitigate persistent nation-state threats.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2025-20281 Critical An Injection Vulnerability in the Cisco Identity Services Engine Yes Gayfemboy botnet False
CVE-2024-7120 Critical An Improper Neutralization of Special Elements used in an OS Command in the Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 devices No Gayfemboy botnet False
CVE-2024-45884 High A Post-Authentication Command Injection Vulnerability in the DrayTek Vigor3900 router. No Gayfemboy botnet False
CVE-2024-45885 High A Post-Authentication Command Injection Vulnerability in the DrayTek Vigor3900 router. No Gayfemboy botnet False
CVE-2024-45887 High A Post-Authentication Command Injection Vulnerability in the DrayTek Vigor3900 router. No Gayfemboy botnet False
CVE-2024-45888 High A Post-Authentication Command Injection Vulnerability in the DrayTek Vigor3900 router. No Gayfemboy botnet False
CVE-2024-45890 High A Post-Authentication Command Injection Vulnerability in the DrayTek Vigor3900 router. No Gayfemboy botnet False
CVE-2024-45891 High A Post-Authentication Command Injection Vulnerability in the DrayTek Vigor3900 router. No Gayfemboy botnet False
CVE-2024-48074 High An Authorized Remote Code Execution in the DrayTek Vigor2960 router. No Gayfemboy botnet False
CVE-2023-1389 High A Command Injection Vulnerability in the TP-Link Archer AX-21 Yes Gayfemboy botnet False
CVE-2023-3519 Critical A Code Injection Vulnerability in Citrix NetScaler ADC and NetScaler Gateway Yes MURKY PANDA False
CVE-2021-4034 High An Out-of-Bounds Read and Write Vulnerability in the Red Hat Polkit Yes Glacial Panda True
CVE-2020-14993 Critical A Stack-Based Buffer Overflow Vulnerability in the DrayTek Vigor2960, Vigor3900, and Vigor300B devices. Yes Gayfemboy botnet False
CVE-2020-8515 Critical A Web Management Page Vulnerability in the DrayTek Vigor Routers. Yes Gayfemboy botnet False
CVE-2016-5195 High A Race Condition Vulnerability Linux Kernel Yes Glacial Panda True

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of vulnerability Product Reference
CVE-2025-7039 Buffer Underrun glib2.0 Resource
CVE-2025-7812 Cross-Site Request Forgery Video Share VOD WordPress plugin Resource
CVE-2025-9344 Stored Cross-Site Scripting UsersWP plugin Resource
CVE-2024-40653 Privilege Escalation Google Android Resource

External References

  1. https://www.cisa.gov/news-events/alerts/2025/08/25/cisa-adds-three-known-exploited-vulnerabilities-catalog  
  2. https://www.cisa.gov/news-events/alerts/2025/08/26/cisa-adds-one-known-exploited-vulnerability-catalog  
  3. https://securitylabs.datadoghq.com/articles/git-arbitrary-file-write/  
  4. https://labs.watchtowr.com/visionaries-at-citrix-have-democratised-remote-network-access-citrix-virtual-apps-and-desktops-cve-unknown/  
  5. https://www.fortinet.com/blog/threat-research/iot-malware-gayfemboy-mirai-based-botnet-campaign  
  6. https://www.crowdstrike.com/en-us/blog/murky-panda-trusted-relationship-threat-in-cloud/  
  7. https://go.crowdstrike.com/rs/281-OBQ-266/images/Threat-Hunt-Report-2025.pdf  

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports