Simplify your online presence. Elevate your brand.

5000 Crushftp Servers Hacked Using Zero Day Exploit

North Korean Hackers Use Zero Day Exploit To Hit Security Researchers
North Korean Hackers Use Zero Day Exploit To Hit Security Researchers

North Korean Hackers Use Zero Day Exploit To Hit Security Researchers Using publicly available information about cve 2024 4040, a crushftp server side template injection vulnerability, an exploit query was run to find vulnerable web interfaces on the internet. Crushftp, in an advisory, said it first detected the zero day exploitation of the vulnerability in the wild on july 18, 2025, 9 a.m. cst, although it acknowledged that it may have been weaponized much earlier. "the attack vector was http (s) for how they could exploit the server," the company said.

Chinese Government Hackers Targeted Us Internet Providers With Zero Day
Chinese Government Hackers Targeted Us Internet Providers With Zero Day

Chinese Government Hackers Targeted Us Internet Providers With Zero Day Enterprise file transfer platform crushftp is sounding the alarm over an actively exploited zero day vulnerability— cve 2025 54309 —that allows attackers to gain full administrative access through the software’s web interface on outdated servers. Crushftp is warning that threat actors are actively exploiting a zero day vulnerability tracked as cve 2025 54309, which allows attackers to gain administrative access via the web interface. In mid july, cybersecurity firm watchtowr labs uncovered an active exploitation campaign targeting crushftp, a widely deployed enterprise file transfer solution. Hackers exploit a crushftp zero day vulnerability to gain admin access and take over servers. update to v10.8.5 or v11.3.4 to stay secure.

New Crushftp Zero Day Exploited In Attacks To Hijack Servers
New Crushftp Zero Day Exploited In Attacks To Hijack Servers

New Crushftp Zero Day Exploited In Attacks To Hijack Servers In mid july, cybersecurity firm watchtowr labs uncovered an active exploitation campaign targeting crushftp, a widely deployed enterprise file transfer solution. Hackers exploit a crushftp zero day vulnerability to gain admin access and take over servers. update to v10.8.5 or v11.3.4 to stay secure. In the case of cve 2025 54309, at least one german user had their crushftp server compromised. timeline analysis suggests the attack occurred on the morning of july 18, 2025, marking not merely theoretical risk but tangible, production impacting breach activity. Crushftp over the weekend warned that hackers have been exploiting a zero day vulnerability in its managed file transfer software to gain administrative access to vulnerable servers. Crushftp urged immediate upgrades, even for dmz deployments. researchers monitored the vulnerability, populating data feeds with vulnerable domains, ips hosting the service, and infrastructure actively exploiting cve 2024 4040 for early detection. A critical zero day flaw in the crushftp managed file transfer platform was confirmed after vendor and threat intelligence sources confirmed active exploitation beginning on 18 july 2025 at 09:00 cst.

Critical Zero Day Exposes Ftp Servers To Attack
Critical Zero Day Exposes Ftp Servers To Attack

Critical Zero Day Exposes Ftp Servers To Attack In the case of cve 2025 54309, at least one german user had their crushftp server compromised. timeline analysis suggests the attack occurred on the morning of july 18, 2025, marking not merely theoretical risk but tangible, production impacting breach activity. Crushftp over the weekend warned that hackers have been exploiting a zero day vulnerability in its managed file transfer software to gain administrative access to vulnerable servers. Crushftp urged immediate upgrades, even for dmz deployments. researchers monitored the vulnerability, populating data feeds with vulnerable domains, ips hosting the service, and infrastructure actively exploiting cve 2024 4040 for early detection. A critical zero day flaw in the crushftp managed file transfer platform was confirmed after vendor and threat intelligence sources confirmed active exploitation beginning on 18 july 2025 at 09:00 cst.

Comments are closed.