Illustration of a cyber attack on Cisco devices, showing analysts monitoring screens with code and warnings in a dark operations room.
Illustration of a cyber attack on Cisco devices, showing analysts monitoring screens with code and warnings in a dark operations room.
Àwòrán tí AI ṣe

Operation Zero Disco exploits Cisco SNMP flaw for rootkits

Àwòrán tí AI ṣe

Cyber threat actors in Operation Zero Disco have exploited a vulnerability in Cisco's SNMP service to install persistent Linux rootkits on network devices. The campaign targets older Cisco switches and uses crafted packets to achieve remote code execution. Trend Micro researchers disclosed the attacks on October 16, 2025, highlighting risks to unpatched systems.

Trend Micro researchers have uncovered Operation Zero Disco, a cyber campaign exploiting CVE-2025-20352, a stack overflow vulnerability in the SNMP subsystem of Cisco IOS and IOS XE Software. Rated at CVSS 7.7, the flaw allows remote authenticated attackers to trigger denial-of-service conditions with low privileges or achieve root code execution with high privileges by sending crafted SNMP packets over IPv4 or IPv6 networks. The vulnerability affects all devices with SNMP enabled, and Cisco's Product Security Incident Response Team confirmed attacks in the wild.

The operation primarily targets older Cisco models, including the 9400, 9300 series, and legacy 3750G switches running outdated Linux distributions without endpoint detection and response tools. Attackers combined the SNMP exploit with a modified version of the Telnet vulnerability CVE-2017-3881 to enable arbitrary memory read and write access. Once inside, they deploy fileless rootkits that hook into the IOSd daemon on the Linux kernel, installing a universal password containing the word 'disco'—a one-letter alteration from 'Cisco.' These rootkits create a UDP listener on any port for remote commands, hide configuration items like account names, EEM scripts, and ACLs from the running config, bypass VTY ACLs, toggle or delete logs, and reset timestamps to conceal changes. Components operate in memory and disappear after reboot, aiding persistence and evasion.

To move laterally, attackers target core switches in segmented networks protected by firewalls. They abuse default public SNMP communities for initial access, add routing rules to reach other VLANs, and use ARP spoofing and IP impersonation to bypass internal firewalls by disabling logs, assigning waystation IPs to ports, and forcing the real device offline. Newer switch models benefit from Address Space Layout Randomization, reducing intrusion success, though repeated attempts can overcome it. Cisco has issued patches, but attacks predated their release. Trend Micro recovered exploits for 32- and 64-bit platforms and published indicators of compromise. For suspected compromises, experts recommend contacting Cisco TAC for firmware analysis and applying detection rules from Trend Micro.

Awọn iroyin ti o ni ibatan

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Àwòrán tí AI ṣe

Researchers discover SSHStalker botnet infecting Linux servers

Ti AI ṣe iroyin Àwòrán tí AI ṣe

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Ti AI ṣe iroyin

Two groups linked to China are exploiting a newly discovered vulnerability in Cisco's email security products. The campaign involves zero-day attacks, highlighting ongoing cybersecurity risks. The issue was reported on December 19, 2025.

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Ti AI ṣe iroyin

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

WatchGuard has addressed a critical remote code execution vulnerability in its Firebox OS firewall software. The company urges users to update immediately to mitigate the risk. The flaw was identified by the firewall maker itself.

Ti AI ṣe iroyin

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

 

 

 

Ojú-ìwé yìí nlo kuki

A nlo kuki fun itupalẹ lati mu ilọsiwaju wa. Ka ìlànà àṣírí wa fun alaye siwaju sii.
Kọ