Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Langflow Flaw Delivers Flodrix DDoS Botnet

June 18, 2025
Reading Time: 2 mins read
in Alerts
New Linux Flaws Allow Easy Root Access

Cybersecurity researchers are calling attention to a new campaign that is actively exploiting a recently disclosed critical security flaw. This campaign is leveraging a vulnerability in the AI application framework Langflow to deliver the potent Flodrix botnet malware. Attackers use this vulnerability to execute downloader scripts on many compromised Langflow servers, which then fetch and install the malware. This activity entails the exploitation of CVE-2025-3248, a missing authentication vulnerability in Langflow with a critical 9.8 CVSS score. Successful exploitation of this flaw could enable unauthenticated attackers to execute arbitrary code via specially crafted HTTP requests on servers.

The latest findings from Trend Micro show that these threat actors are specifically targeting unpatched internet-exposed Langflow instances. They are leveraging a publicly-available proof-of-concept code to conduct reconnaissance and then drop a shell script downloader onto the server. This downloader is responsible for retrieving and then executing the Flodrix botnet malware from a hardcoded attacker-controlled IP address. Once installed on a compromised system, the Flodrix malware then sets up communications with a remote server to receive commands. It receives these commands over TCP in order to launch distributed denial-of-service (DDoS) attacks against various targets of interest to them.

The Flodrix botnet malware also supports making its command-and-control connections over the anonymous TOR network to hide its activities.

Flodrix is currently assessed by security researchers to be an evolution of another botnet which is called LeetHozer. This older LeetHozer botnet has been previously linked by cybersecurity professionals to the well-known cybercriminal group known as Moobot. The improved Flodrix variant incorporates the ability to discreetly remove itself from an infected system and also to minimize its forensic traces.

This makes it much harder for incident responders to analyze the full scope of the attack after it has already occurred.

Another significant change in this new variant is the introduction of new DDoS attack types, which are now also encrypted. This adds a further layer of obfuscation that can complicate network-based detection efforts by many different types of security products. Trend Micro said it has identified the unknown threat actors hosting different downloader scripts on the same host that is used to fetch Flodrix. This observation strongly suggests that the entire malware campaign is currently undergoing very active development by the cybercriminals responsible. Attackers are likely profiling all vulnerable Langflow servers to identify high-value targets for future, more damaging infections using this malware.

  • Hackers Exploit Langflow AI Tool Flaw To Spread Flodrix DDoS Botnet
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJune 2025
ADVERTISEMENT

Related Posts

Wing FTP Server RCE Flaw Exploited

WinRAR Zero-Day Exploit $80K on Dark Web

July 14, 2025
Wing FTP Server RCE Flaw Exploited

Google Gemini Flaw Hijacks Email Summaries

July 14, 2025
Wing FTP Server RCE Flaw Exploited

Wing FTP Server RCE Flaw Exploited

July 14, 2025
Fake Firms Push Malware on Crypto Users

Fake Sites Push Investment Scams

July 11, 2025
Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

July 11, 2025
Fake Firms Push Malware on Crypto Users

Fake Firms Push Malware on Crypto Users

July 11, 2025

Latest Alerts

WinRAR Zero-Day Exploit $80K on Dark Web

Google Gemini Flaw Hijacks Email Summaries

Wing FTP Server RCE Flaw Exploited

Fake Sites Push Investment Scams

Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

Subscribe to our newsletter

    Latest Incidents

    Supermarket Cyberattack Prompts Warning

    China Hacker Suspected in DC Law Firm Breach

    nius.de Cyberattack Leaks User Data

    Microsoft’s Outlook Long Outage

    Avantic Lab Affected By Ransomware

    $40M+ Stolen from GMX Crypto Platform

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial