Vulnerability Management, Network Security

Mirai botnets deployed via Wazuh Server exploit

botnet bot-net computer virus

Attacks exploiting the recently addressed critical unsafe deserialization vulnerability in Wazuh Server, tracked as CVE-2025-24016, have been launched to deploy a pair of Mirai botnet variants just weeks following disclosure and proof-of-concept release, The Hacker News reports.

Threat actors behind the initial intrusion leveraged the flaw to facilitate execution of a shell script that downloaded the LZRD Mirai botnet version, which has also been used in attacks involving deprecated GeoVision IoT devices, according to findings from Akamai. Another Mirai variant dubbed "Resbot", also known as Resentual, was also distributed using a nefarious shell script, noted researchers, who observed the said botnet version to have targeted Huawei and TrueOnline ZyXEL router and Realtek SDK exploits. "The propagation of Mirai continues relatively unabated, as it remains rather straightforward to repurpose and reuse old source code to set up or create new botnet. And botnet operators can often find success with simply leveraging newly published exploits," said researchers.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds