Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CrushFTP Warns of Exploit in the Wild

July 22, 2025
Reading Time: 3 mins read
in Alerts
3.5K Sites Hijacked to Secretly Mine Crypto

The popular file transfer company CrushFTP said it has discovered a previously unknown vulnerability being exploited by hackers. A critical zero-day exploit, identified as CVE-2025-54309, was observed actively being used in the wild. While the full timeline of the exploitation isn’t definitively known, this particular date marked the widespread detection of attacks. Threat actors appear to have reverse-engineered a prior code fix implemented by CrushFTP, identifying a related vulnerability that was inadvertently left exposed in older versions. This oversight allowed them to craft an exploit targeting unpatched systems, specifically leveraging the HTTP(S) protocol as the attack vector.

The vulnerability primarily affects CrushFTP builds released before July 1st, 2025. This means that users who have diligently kept their CrushFTP installations up to date with the latest versions are likely unaffected by this specific exploit. Curiously, the initial fix, which was intended to address a separate issue related to AS2 over HTTP(S), appears to have inadvertently provided a blueprint for attackers to exploit an underlying bug. This incident highlights the sophisticated tactics employed by cyber adversaries, who frequently analyze software patches to uncover related or re-emergent vulnerabilities that can then be weaponized against unpatched systems.

For organizations or individuals who suspect their CrushFTP server may have been compromised, immediate action is crucial.

The primary recommendation is to restore a default user from a backup folder created before the exploit, ideally from around July 16th, 2025, to minimize the risk of lingering malicious configurations. It’s important to note that these backup zip files often require specialized tools like 7-Zip or WinRAR for extraction. Additionally, administrators should thoroughly review upload and download reports for any unauthorized data transfers, as attackers have reportedly reused scripts from previous exploits to deploy malicious payloads on compromised servers.

To bolster future security posture and prevent similar incidents, several mitigation strategies are highly recommended. These include strictly limiting and whitelisting IP addresses permitted for administrative access, thereby significantly reducing the attack surface. Enterprise users are strongly advised to deploy a DMZ (Demilitarized Zone) CrushFTP instance in front of their main server, adding an extra layer of security. Furthermore, enabling automatic and frequent updates within CrushFTP preferences is paramount, ensuring that systems receive critical patches as soon as they become available. Signing up for emergency notifications from CrushFTP is also a proactive step to stay informed about new threats.

Identifying a compromise can be subtle, but there are several key indicators. Suspicious entries such as “last_logins” in the MainUsers/default/user.XML file, a recently modified date on the default user’s XML, or the default user inexplicably having admin access are strong signs of a breach. The presence of long, random user IDs, other newly created admin accounts, or unexpected changes to the end-user WebInterface—such as missing buttons or a regular user gaining admin privileges—also point to a compromise. It’s also worth noting that attackers may attempt to display a fake version number to deceive administrators; users should always use CrushFTP’s “validate hashes” function on the about tab to verify file integrity and detect any unauthorized code installations.

Reference:

  • File Transfer Firm CrushFTP Warns of Active Zero-Day Exploit Observed in Real-World Attacks
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJuly 2025
ADVERTISEMENT

Related Posts

Scattered Spider Hits ESXi Servers

Scattered Spider Hits ESXi Servers

July 28, 2025
Scattered Spider Hits ESXi Servers

Malware Hides in Fake Dating Apps

July 28, 2025
Scattered Spider Hits ESXi Servers

Post SMTP Bug Exposes 200K Sites

July 28, 2025
Infostealer Hidden in Steam Game

Sophos, SonicWall Patch Critical RCE Bugs

July 25, 2025
Infostealer Hidden in Steam Game

CastleLoader Uses Clickfix on Windows

July 25, 2025
Infostealer Hidden in Steam Game

Koske Malware Hides in Panda Images

July 25, 2025

Latest Alerts

Post SMTP Bug Exposes 200K Sites

Malware Hides in Fake Dating Apps

Scattered Spider Hits ESXi Servers

CastleLoader Uses Clickfix on Windows

Sophos, SonicWall Patch Critical RCE Bugs

Koske Malware Hides in Panda Images

Subscribe to our newsletter

    Latest Incidents

    Cyberattack Hits French Naval Group

    Tea App Leak Exposes 13K Women Users

    Allianz Life Data Breach Hits Majority

    Hackers Target Amazon’s AI Code Bot

    Infostealer Hidden in Steam Game

    APTs Use Fake Dalai Lama Apps to Spy

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial