CyberNews: 23/08/2025 Edition

Published by Dunateo on 2025-08-23

Today’s roundup

Summary

Recent reports highlight a surge in inexpensive bot‑net assembly via Redis server exploitation.
Attackers target the critical CVE-2024-36401 (CVSS 9.8) to compromise Redis instances worldwide.
Exploited servers become hubs for IoT botnets, residential proxy networks, and crypto‑mining farms.
The campaigns leverage vulnerabilities in GeoServer, PolarEdge, and Gayfemboy platforms.
Security researchers note that the Redis compromises are conducted without users’ awareness.
Affected systems typically run default or weak configurations, enabling remote code execution.
The bot‑net infrastructure can route large volumes of malicious traffic, masking origin.
Command and Control channels are established through compromised Redis servers, encrypted and frequently rotated.
Mitigation includes patching CVE-2024-36401, hardening Redis instances, and monitoring anomalous outbound traffic.
Cyber‑security teams should audit exposed Redis deployments and enforce strict firewall rules.
The latest wave underscores the ease with which existing service software can be weaponised.
Proactive defense remains the most effective countermeasure against these rapidly evolving exploits.