HomeVulnerabilityNew Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch...

New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks

Cybersecurity researchers have known as consideration to a brand new marketing campaign that is actively exploiting a just lately disclosed crucial security flaw in Langflow to ship the Flodrix botnet malware.

“Attackers use the vulnerability to execute downloader scripts on compromised Langflow servers, which in flip fetch and set up the Flodrix malware,” Pattern Micro researchers Aliakbar Zahravi, Ahmed Mohamed Ibrahim, Sunil Bharti, and Shubham Singh mentioned in a technical report revealed at this time.

The exercise entails the exploitation of CVE-2025-3248 (CVSS rating: 9.8), a lacking authentication vulnerability in Langflow, a Python-based “visible framework” for constructing synthetic intelligence (AI) purposes.

Cybersecurity

Profitable exploitation of the flaw may allow unauthenticated attackers to execute arbitrary code through crafted HTTP requests. It was patched by Langflow in March 2025 with model 1.3.0.

Final month, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) flagged the lively exploitation of CVE-2025-3248 within the wild, with the SANS Know-how Institute revealing that it detected exploit makes an attempt towards its honeypot servers.

See also  Cisco patches extreme password reset flaw that lets hackers hijack SSM On-Prem license servers

The most recent findings from Pattern Micro present that risk actors are concentrating on unpatched internet-exposed Langflow situations leveraging a publicly-available proof-of-concept (PoC) code to conduct reconnaissance and drop a shell script downloader liable for retrieving and executing the Flodrix botnet malware from “80.66.75[.]121:25565.”

As soon as put in, Flodrix units up communications with a distant server to obtain instructions over TCP with a view to launch distributed denial-of-service (DDoS) assaults towards goal IP addresses of curiosity. The botnet additionally helps connections over the TOR anonymity community.

“Since Langflow doesn’t implement enter validation or sandboxing, these payloads are compiled and executed inside the server’s context, resulting in [remote code execution],” the researchers mentioned. “Primarily based on these steps, the attacker is probably going profiling all weak servers and makes use of the collected information to establish high-value targets for future infections.”

Pattern Micro mentioned it recognized the unknown risk actors to be internet hosting totally different downloader scripts on the identical host used to fetch Flodrix, suggesting that the marketing campaign is present process lively growth.

Cybersecurity

Flodrix is assessed to be an evolution of one other botnet known as LeetHozer that is linked to the Moobot group. The improved variant incorporates the power to discreetly take away itself, reduce forensic traces, and complicate evaluation efforts by obfuscating command-and-control (C2) server addresses and different essential indicators.

See also  December Patch Tuesday: Home windows Cloud Information Mini Filter Driver gap already being exploited

“One other vital change is the introduction of latest DDoS assault varieties, which are actually additionally encrypted, including an additional layer of obfuscation,” Pattern Micro mentioned. “The brand new pattern additionally notably enumerates the working processes by opening /proc listing to entry all working processes.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular