Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The founders have just raised funding to revisit the same problem: affordable custom home design.

Marissa Mayer’s startup Dazzle raises $8 million led by Forerunner’s Kirsten Green

Amazon’s AI assistant Alexa+ now works with Angi, Expedia, Square, and Yelp

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Sneeit WordPress RCE in the wild as ICTBroadcast bug fuels Frost botnet attack
Identity

Sneeit WordPress RCE in the wild as ICTBroadcast bug fuels Frost botnet attack

userBy userDecember 8, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A critical security flaw in the Sneeit Framework plugin for WordPress is being exploited in the wild, according to data from Wordfence.

The remote code execution vulnerability in question is CVE-2025-6389 (CVSS score: 9.8), which affects all versions of the plugin prior to 8.3. Patched in version 8.4 released on August 5, 2025. This plugin has over 1,700 active installations.

“this is, [sneeit_articles_pagination_callback()] Wordfence said: “This function accepts user input and passes it to call_user_func(). This allows an unauthenticated attacker to execute code on the server, which can be used to insert a backdoor or create a new administrative user account.”

This means that this vulnerability can be used to inject a malicious administrator user by calling arbitrary PHP functions such as wp_insert_user(). Attackers can then weaponize it to take control of your site and inject malicious code that redirects site visitors to other dangerous sites, malware, or spam.

According to Wordfence, the actual exploitation began on November 24, 2025, the day of publication, and the company has blocked over 131,000 attempts targeting the flaw. Of these, 15,381 attack attempts were recorded in the last 24 hours alone.

cyber security

Efforts include sending specially crafted HTTP requests to the ‘/wp-admin/admin-ajax.php’ endpoint to create malicious administrator user accounts such as ‘arudikadis’ and uploading a malicious PHP file ‘tijtewmg.php’ that could potentially allow backdoor access.

The attack originated from the following IP address –

185.125.50[.]59 182.8.226[.]51 89.187.175[.]80 194.104.147[.]192 196.251.100[.]39 114.10.116[.]226 116.234.108[.]143

The WordPress security firm said it has also observed a malicious PHP file with permissions to scan directories, read, edit, and delete files, and to extract ZIP files. These PHP files are named “xL.php”, “Canonical.php”, “.a.php”, and “simple.php”.

According to Wordfence, the “xL.php” shell is downloaded by another PHP file called “up_sf.php” that is designed to exploit this vulnerability. It also downloads the “.htaccess” file from an external server (“racoonlab”).[.]top”) to the compromised host.

“This .htaccess file ensures that access to files with a specific file extension is allowed on the Apache server,” says István Marton. “This is useful if access to the script is prohibited by other .htaccess files, such as in the upload directory.”

ICT broadcast flaws exploited to deliver ‘Frost’ DDoS botnet

This disclosure comes after VulnCheck announced that it has observed a new attack that exploits a critical flaw in ICTBroadcast (CVE-2025-2611, CVSS score: 9.3) targeting honeypot systems to download a shell script stager that downloads multiple architecture-specific versions of a binary called “frost.”

After each downloaded version is executed, the payload and the stager itself are removed to hide any trace of the activity. The ultimate goal of this activity is to perform a Distributed Denial of Service (DDoS) attack against the intended target.

cyber security

“The ‘frost’ binary combines spreader logic and DDoS tools, including 14 exploits against 15 CVEs,” said VulnCheck’s Jacob Baines. “What matters is how it spreads. Operators are not carpet-bombing the internet with exploits. ‘Frost’ checks the target first and only proceeds with the exploit if it finds certain indicators it expects.”

For example, this binary exploits CVE-2025-1610 only after receiving an HTTP response containing “Set-Cookie: user=(null)” and then a subsequent response to a second request containing “Set-Cookie: user=admin”. If these markers are not present, the binary remains dormant and does nothing. The attack starts from IP address 87.121.84.[.]52.

Although the identified vulnerabilities have been exploited by a variety of DDoS botnets, evidence suggests that the latest attacks are small-scale, targeted attacks, given that fewer than 10,000 systems are affected by the vulnerabilities exposed on the internet.

“This limits the size of the botnets built on top of these CVEs, making this operator a relatively small player,” Baines said. “Notably, the ICTBroadcast exploit that delivered this sample does not appear in the binary, indicating that the operator has additional capabilities not shown here.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSafety and efficiency: Beam-intercepting devices
Next Article ‘Hobbits’ may have become extinct due to drought forcing them into competition with modern humans, new research suggests
user
  • Website

Related Posts

Two Chrome extensions discovered to be secretly stealing credentials from over 170 sites

December 23, 2025

Interpol arrests 574 people in Africa. Ukrainian ransomware company pleads guilty

December 23, 2025

Google Workspace password manager tutorial

December 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The founders have just raised funding to revisit the same problem: affordable custom home design.

Marissa Mayer’s startup Dazzle raises $8 million led by Forerunner’s Kirsten Green

Amazon’s AI assistant Alexa+ now works with Angi, Expedia, Square, and Yelp

Lemon Slice gets $10.5 million from YC and Matrix to build digital avatar technology

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.