meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

A tale of two botnets. [Research Saturday]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 28 June 2025

⏱️ 22 minutes

🧾️ Download transcript

Summary

This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. The campaigns highlight how quickly attackers are adapting proof-of-concept exploits to spread malware, underscoring the urgency of patching vulnerable systems. One botnet appears to target Italian-speaking users, suggesting regionally tailored operations. The research can be found here: ⁠Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:09.7

And now a word from our sponsor, SpyCloud. Identity is the new battleground, and attackers are

0:17.9

exploiting stolen identities to infiltrate your organization.

0:21.6

Traditional defenses can't keep up.

0:23.9

SpyCloud's holistic identity threat protection helps security teams uncover and automatically

0:29.3

remediate hidden exposures across your users, from breaches, malware and fishing to neutralize

0:35.6

identity-based threats like account takeover, fraud, and ransomware.

0:40.0

Don't let invisible threats compromise your business.

0:43.0

Get your free corporate darknet exposure report at spycloud.com slash cyberwire and see what

0:49.9

attackers already know. That's spycloud.com slash cyberwire.

0:55.4

Hello everyone and welcome to the CyberWires Research Saturday.

1:11.4

I'm Dave Bittner and this is our weekly conversation with researchers and analysts tracking

1:16.6

down the threats and vulnerabilities, solving some of the hard problems and protecting

1:21.1

ourselves in a rapidly evolving cyberspace.

1:24.8

Thanks for joining us.

1:36.2

If you followed Akamai service publications before, you might know that we run a global network of honey pots that collect on a lot of different vulnerabilities that different

1:41.6

kind of botnets are targeting. These tend to be IoT devices,

1:45.4

but if you've been following Marai botnets or botnets in general for a while,

1:49.6

you might know that sometimes they do target vulnerabilities

1:52.2

or machines that are not IoT, like in this case.

1:55.8

That's Kyle Lefton, security researcher at Akamai.

1:59.3

The research we're discussing today is titled Two Two Bot Nets, One Flaw.

...

Transcript will be available on the free plan in 20 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.