Illustration of a cyber attack on Cisco devices, showing analysts monitoring screens with code and warnings in a dark operations room.
Illustration of a cyber attack on Cisco devices, showing analysts monitoring screens with code and warnings in a dark operations room.
Picha iliyoundwa na AI

Operation Zero Disco exploits Cisco SNMP flaw for rootkits

Picha iliyoundwa na AI

Cyber threat actors in Operation Zero Disco have exploited a vulnerability in Cisco's SNMP service to install persistent Linux rootkits on network devices. The campaign targets older Cisco switches and uses crafted packets to achieve remote code execution. Trend Micro researchers disclosed the attacks on October 16, 2025, highlighting risks to unpatched systems.

Trend Micro researchers have uncovered Operation Zero Disco, a cyber campaign exploiting CVE-2025-20352, a stack overflow vulnerability in the SNMP subsystem of Cisco IOS and IOS XE Software. Rated at CVSS 7.7, the flaw allows remote authenticated attackers to trigger denial-of-service conditions with low privileges or achieve root code execution with high privileges by sending crafted SNMP packets over IPv4 or IPv6 networks. The vulnerability affects all devices with SNMP enabled, and Cisco's Product Security Incident Response Team confirmed attacks in the wild.

The operation primarily targets older Cisco models, including the 9400, 9300 series, and legacy 3750G switches running outdated Linux distributions without endpoint detection and response tools. Attackers combined the SNMP exploit with a modified version of the Telnet vulnerability CVE-2017-3881 to enable arbitrary memory read and write access. Once inside, they deploy fileless rootkits that hook into the IOSd daemon on the Linux kernel, installing a universal password containing the word 'disco'—a one-letter alteration from 'Cisco.' These rootkits create a UDP listener on any port for remote commands, hide configuration items like account names, EEM scripts, and ACLs from the running config, bypass VTY ACLs, toggle or delete logs, and reset timestamps to conceal changes. Components operate in memory and disappear after reboot, aiding persistence and evasion.

To move laterally, attackers target core switches in segmented networks protected by firewalls. They abuse default public SNMP communities for initial access, add routing rules to reach other VLANs, and use ARP spoofing and IP impersonation to bypass internal firewalls by disabling logs, assigning waystation IPs to ports, and forcing the real device offline. Newer switch models benefit from Address Space Layout Randomization, reducing intrusion success, though repeated attempts can overcome it. Cisco has issued patches, but attacks predated their release. Trend Micro recovered exploits for 32- and 64-bit platforms and published indicators of compromise. For suspected compromises, experts recommend contacting Cisco TAC for firmware analysis and applying detection rules from Trend Micro.

Makala yanayohusiana

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Picha iliyoundwa na AI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Imeripotiwa na AI Picha iliyoundwa na AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Researchers have unveiled AirSnitch, a series of attacks that undermine client isolation in Wi-Fi networks, allowing unauthorized communication between devices. The technique exploits low-level network behaviors and affects routers from major manufacturers including Netgear, D-Link, and Cisco. Presented at the 2026 Network and Distributed System Security Symposium, the findings highlight vulnerabilities in home, office, and enterprise setups.

Imeripotiwa na AI

Zyxel has issued a warning about a critical remote code execution (RCE) security flaw that could affect more than a dozen of its routers. The company has addressed a handful of concerning vulnerabilities in its devices. This update comes as part of ongoing efforts to secure networking equipment.

The U.S. Department of the Treasury has sanctioned a Russian exploit brokerage network accused of buying stolen U.S. government cyber tools with cryptocurrency and reselling them. This marks the first use of authorities under the Protecting American Intellectual Property Act. The network, led by Sergey Sergeyevich Zelenyuk, obtained at least eight proprietary tools from a U.S. defense contractor.

Imeripotiwa na AI

Elastic Security Labs has detailed the evolution of Linux rootkits in a two-part research series published on March 5, 2026. These modern threats exploit kernel features like eBPF and io_uring to remain hidden in cloud, IoT, and server environments. The research highlights how such rootkits evade traditional detection methods.

Jumatatu, 11. Mwezi wa tano 2026, 16:32:24

Linux kernel could gain kill switch for vulnerable functions

Jumamosi, 9. Mwezi wa tano 2026, 20:17:43

New dirty frag exploit grants root access on linux systems

Jumanne, 5. Mwezi wa tano 2026, 17:44:08

US government issues urgent CopyFail warning as Linux patches roll out

Jumanne, 7. Mwezi wa nne 2026, 17:23:00

Western agencies warn of russian hackers on tp-link routers

Ijumaa, 13. Mwezi wa tatu 2026, 18:03:59

Veeam patches three critical security flaws in backup servers

Alhamisi, 12. Mwezi wa tatu 2026, 22:40:07

US and Europe disrupt SocksEscort proxy network

Jumatano, 11. Mwezi wa tatu 2026, 07:15:19

14,000 Asus routers infected by takedown-resistant KadNap malware

Alhamisi, 19. Mwezi wa pili 2026, 13:36:25

Researchers uncover new SysUpdate malware variant targeting Linux

Jumatano, 18. Mwezi wa pili 2026, 11:16:48

Dell zero-day flaw unpatched for nearly two years

Jumamosi, 14. Mwezi wa pili 2026, 06:39:37

SSHStalker botnet uses IRC to target Linux servers

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa