Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CrushFTP Warns of Exploit in the Wild

July 22, 2025
Reading Time: 3 mins read
in Alerts
3.5K Sites Hijacked to Secretly Mine Crypto

The popular file transfer company CrushFTP said it has discovered a previously unknown vulnerability being exploited by hackers. A critical zero-day exploit, identified as CVE-2025-54309, was observed actively being used in the wild. While the full timeline of the exploitation isn’t definitively known, this particular date marked the widespread detection of attacks. Threat actors appear to have reverse-engineered a prior code fix implemented by CrushFTP, identifying a related vulnerability that was inadvertently left exposed in older versions. This oversight allowed them to craft an exploit targeting unpatched systems, specifically leveraging the HTTP(S) protocol as the attack vector.

The vulnerability primarily affects CrushFTP builds released before July 1st, 2025. This means that users who have diligently kept their CrushFTP installations up to date with the latest versions are likely unaffected by this specific exploit. Curiously, the initial fix, which was intended to address a separate issue related to AS2 over HTTP(S), appears to have inadvertently provided a blueprint for attackers to exploit an underlying bug. This incident highlights the sophisticated tactics employed by cyber adversaries, who frequently analyze software patches to uncover related or re-emergent vulnerabilities that can then be weaponized against unpatched systems.

For organizations or individuals who suspect their CrushFTP server may have been compromised, immediate action is crucial.

The primary recommendation is to restore a default user from a backup folder created before the exploit, ideally from around July 16th, 2025, to minimize the risk of lingering malicious configurations. It’s important to note that these backup zip files often require specialized tools like 7-Zip or WinRAR for extraction. Additionally, administrators should thoroughly review upload and download reports for any unauthorized data transfers, as attackers have reportedly reused scripts from previous exploits to deploy malicious payloads on compromised servers.

To bolster future security posture and prevent similar incidents, several mitigation strategies are highly recommended. These include strictly limiting and whitelisting IP addresses permitted for administrative access, thereby significantly reducing the attack surface. Enterprise users are strongly advised to deploy a DMZ (Demilitarized Zone) CrushFTP instance in front of their main server, adding an extra layer of security. Furthermore, enabling automatic and frequent updates within CrushFTP preferences is paramount, ensuring that systems receive critical patches as soon as they become available. Signing up for emergency notifications from CrushFTP is also a proactive step to stay informed about new threats.

Identifying a compromise can be subtle, but there are several key indicators. Suspicious entries such as “last_logins” in the MainUsers/default/user.XML file, a recently modified date on the default user’s XML, or the default user inexplicably having admin access are strong signs of a breach. The presence of long, random user IDs, other newly created admin accounts, or unexpected changes to the end-user WebInterface—such as missing buttons or a regular user gaining admin privileges—also point to a compromise. It’s also worth noting that attackers may attempt to display a fake version number to deceive administrators; users should always use CrushFTP’s “validate hashes” function on the about tab to verify file integrity and detect any unauthorized code installations.

Reference:

  • File Transfer Firm CrushFTP Warns of Active Zero-Day Exploit Observed in Real-World Attacks
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJuly 2025
ADVERTISEMENT

Related Posts

Apple Warns Users As CERT-FR Confirms

Former Feds Targeted By Chinese Jobs

September 12, 2025
Apple Warns Users As CERT-FR Confirms

CHILLYHELL And ZynorRAT Threaten Systems

September 12, 2025
Apple Warns Users As CERT-FR Confirms

Apple Warns Users As CERT-FR Confirms

September 12, 2025
SAP Patches Critical NetWeaver Flaw

EggStreme Malware Hits Philippine Military

September 11, 2025
SAP Patches Critical NetWeaver Flaw

RatOn Malware Hits Android Banking

September 11, 2025
SAP Patches Critical NetWeaver Flaw

SAP Patches Critical NetWeaver Flaw

September 11, 2025

Latest Alerts

Former Feds Targeted By Chinese Jobs

CHILLYHELL And ZynorRAT Threaten Systems

Apple Warns Users As CERT-FR Confirms

RatOn Malware Hits Android Banking

EggStreme Malware Hits Philippine Military

SAP Patches Critical NetWeaver Flaw

Subscribe to our newsletter

    Latest Incidents

    Panama Economy Ministry Reports Breach

    LNER Warns Customers Of Data Breach

    Hello Gym Leak Exposes Member Audio

    DDoS Defender Hit by Massive Attack

    Vienna VA Reports Data Breach Leak

    GitHub Hack Triggers Salesloft Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial