Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Bitcoin price target $ 116,000 matches the major liquidity wall

    August 4, 2025

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»New Crushftp Zero-Day attacked the kidnapping server in attacks
    Security

    New Crushftp Zero-Day attacked the kidnapping server in attacks

    PineapplesUpdateBy PineapplesUpdateJuly 19, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    New Crushftp Zero-Day attacked the kidnapping server in attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New Crushftp Zero-Day attacked the kidnapping server in attacks

    Crushfts are warning that the actor of the danger is actively exploiting a zero-day vulnerability tracked as the CVE-2025-54309, which allows the attackers to achieve administrative access through the web interface on the weak server.

    Crushafp is an enterprise file transfer server that is used by organizations to safely share and manage files on FTP, SFTP, HTTP/S and other protocols.

    According to crushfi, the danger actors were first revealed to exploit vulnerability on CST at 9 am on July 18, although it could begin in the early hours of the previous day.

    CEO of Crushfy Ben Spink told Blapping Computer that he had earlier decided to have a vulnerability related to AS2 in HTTP (on) that inadvertently blocked the blame of zero-day.

    Spink told bleepingcomputer, “Incidentally a pre -fixed was to block this vulnerability, but the former fix was targeting a separate issue and default was rarely shutting down some rarely used facilities.”

    Crushftp says that the danger actors engineered their software and discovered this new bug and started exploiting it on the devices that are not up-to-det on their patch.

    “We believe Crushftp advisor,

    “The attack vector http (s) was how they could exploit the server. We had set a separate issue related to the AS2 in HTTP (s), not realizing that the former bug could be used as this exploitation. Hackers clearly saw our code change, and discovered a way to exploit the pre -bug.

    “As usual we recommend regularly and frequent patching. Anyone who kept till date was spared from this exploitation.”

    The attack occurs through the web interface of the software, which is in versions before crushftp v10.8.5 and crushftp v11.3.4_23. It is not clear when these versions were released, but the crushftp says around 1 July.

    Crushftpie said that the systems that have been updated are not weak.

    Enterprise customers using an DMZ crushfast institute to separate their main servers are not affected by this vulnerability.

    Those administrators believe that their system was compromised, they are advised to restore the default user configuration from a backup before July 16. Indicators of the agreement include:

    • Unphetual entries in mainusers/default/user.xml, especially recent modifications or A last_logins Field
    • New, unfamiliar administrator-level user names such as 7a0d26089ac528941bf8cb998d97f408m,

    Spink says that they are most defaulted as the main IOC to the default user.

    Spink told BlappingCompter, “In general we have modified the default user as the main IOC. In general, in a very invalid ways have been modified in very invalid ways that were still useable for the attacker, but no one else,” Spink told the BlappingCompter.

    Recommend the following stages to review the crushfastpie uploads and to download logs for abnormal activity and reduce exploitation:

    • IP VITISTING for Server and Administrator Access
    • Using a dmz example
    • Enable automatic update

    However, cyber security firm Rapid 7 says that DMZ’s use may not be a reliable strategy to prevent exploitation.

    “From an abundance of caution, Rapid 7 advises against relying on a demilitered zone (DMZ) as a mitigation strategy,” Rapid7 warned,

    At this time, it is not clear whether the attacks were used for data theft or to deploy malware. However, managed file transfer solutions have become high-value targets for data theft campaigns in recent years.

    In the past, the ransomware gang, usually clops, have repeatedly exploited zero-day weaknesses in the same platforms, including large-scale data theft and forced recovery attacks, including Cleo, Movit Transfer, Gonavez MFT and Excelian FTA.


    Knowledgeable

    CISOS knows how to purchase a board begins with a clear, strategic approach how the cloud safety runs the business price.

    This helps to introduce the risk, impact and priorities to the free, editable board report deck deck security leaders in clear business terms. Convert security updates into meaningful conversations and take fast decision in boardroom.

    attacked attacks Crushftp kidnapping server zeroday
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleChina’s Tianvan 2 investigations snap the striking scenes of the Earth and Moon, while the route for asteroid
    Next Article Apple News+ adds a new game that uses emoji and genmoji to solve the puzzle
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Gemini adds powerful new deep think models – what it does and who can try it

    August 4, 2025
    Security

    CTM360 Spot malicious ‘clicktok’ campaign targets Tiktok Shop users

    August 4, 2025
    Security

    How to infiltrate Linux system without leaving a trace

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Bitcoin price target $ 116,000 matches the major liquidity wall

    August 4, 2025

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.