WME Security Briefing 13 February 2025

WME Cybersecurity Briefings No. 038

DragonRank Targets IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects

Overview

Reports assert there has been a brand new wave of cyberattacks attacking Asian Internet Information Services (IIS). The attackers are suspected to be Chinese-speaking as they have been identified with the name, DragonRank. They are using BadIIS malware to manipulate SEO that redirects users to illegal gambling websites. This attack primarily targets servers in countries like India, Thailand, Vietnam, etc. and has been impacting sectors like government, universities, tech sector, etc.

Impact

Once the installation of the BadIIS malware is there, this attack basically modifies the HTTP response headers. The change then redirects legit users coming from okay websites to illegal ones. Their way of manipulation involves first checking certain fields in the HTTP header, say, for example, ‘User-Agent’ and ‘Referer,’ and then determining if they contain specific SEO terms.

The compromised servers also host credential-harvesting pages which is another big risk to organizations relying on them for daily ops. All in all, this SEO manipulation tactic is surely damaging the integrity of the affected systems.

Recommendation

If you are operating IIS servers, especially if you are located in the affected regions, as mentioned above, you should immediately audit your servers. Apply all available security patches. That said, keep monitoring for unauthorized redirects and have your security teams regularly investigate logs for any signs of BadIIS malware.

WME Logo Separator PNG

Critical Security Flaws in Zimbra Collaboration Software Addressed in Recent Updates

Overview

Zimbra rolls out latest security updates as they address some severe vulnerabilities in their collaboration software. The flaws were severe and if they were exploited, they could potentially cause loss of critical info and put your data at risk of exposure.

Zimbra has been proactively providing patches to cover such flaws and the latest one patches the vulnerabilities tracked as CVE-2025-25064. This time, there’s a critical XSS issue and a server-side request forgery SSRF issue, which is medium-severity though. The company officially recommends users update their systems asap.

Impact

The first vulnerability, CVE-2025-25064, has CVSS score 9.8/10. You know this is severe. This flaw basically arises from inadequate input sanitization in the ZimbraSync Service SOAP endpoint. The affected versions include all prior to 10.0.12 and 10.1.4. If this flaw is exploited, malicious SQL queries can be injected and sensitive email metadata can be at risk.

Zimbra has patched XSS vulnerability in their Classic Web Client as well. No CVE score has been assigned to it yet, but it also comes with a big risk of possible execution of malicious scripts. That said, the SSRF flaw has also been addressed, which could let attackers redirect requests to internal network services.

Recommendation

We recommend Zimbra users upgrade to the following patched versions ASAP:

  • CVE-2025-25064: To avoid SQL Injection, upgrade to versions 10.0.12, 10.1.4, or later.
  • The Stored XSS Vulnerability: Update to versions 9.0.0 Patch 44, 10.0.13, or 10.1.5
  • CVE-2025-25065: Upgrade to versions 9.0.0 Patch 43, 10.0.12, or 10.1.4 to avoid the SSRF vulnerability.
WME Logo Separator PNG

XE Hacker Group Exploits VeraCore Zero-Day Vulnerabilities to Deploy Persistent Web Shells

Overview

Some instances of zero-day vulnerabilities in Advantive VeraCore have been detected. This is a quite popular software used in the manufacturing and distribution sectors. XE Group, which is a cybercrime gang based in Vietnam, have been suspectedly exploiting these flaws to drop reverse shells and web shells to achieve persistent access on compromised VeraCore systems. The vulnerabilities, CVE-2024-57968 and CVE-2025-25181, seem to be a part of the broader attack strategy to compromise enterprise systems.

Impact

The vulnerabilities are significant because of the level of ease they provide to attackers to control affected systems. CVE-2024-57968 allows attackers to upload dangerous files to unintended folders. On the other hand, CVE-2025-25181 facilitates SQL injection and arbitrary commands. Exploiting these flaws, XE gang deploys ASPXSpy web shells to enumerate the file system and also allows them to scan networks and run SQL queries.

Recommendation

Advantive VeraCore users should immediately assess their systems for the presence of vulnerable versions (before the fixed version 2024.4.2.1).

WME Logo Separator PNG

Malicious ML Models Exploit Broken Pickle Format to Evade Detection

Overview

Cybersecurity reports just identified two malicious ML models hosted on Hugging Face. Basically, they have been taking advantage of “broken” pickle format to evade detection. The models are typically used to serialize Python objects. Pickle format is necessary for distributing ML models as it brings enormous safety issues if exploited.

The PyTorch-based pickle files had reverse shell payloads which made their malicious nature. Despite being flagged as suspicious, these corrupt files successfully executed the payload without triggering any alarms, and this was because they used their very own unique exploitation method. 

Impact

The malicious models found in the Hugging Face repositories:

  • glockr1/ballr7
  • who-r-u0000/0000000000000000000000000000000000000

were able to execute reverse shell upon deserialization.

The payload connects with a hardcoded IP address which compromises the system and the attack method, commonly called nullifAI, is inordinately dangerous because of the evading capabilities of the broken pickle files.

7z compression format is the reason these models are particularly insidious. They don’t use the common ZIP format as 7z allows them to evade security flagging. That said, the broken pickle format causes issues during deserialization as malicious payloads are executed before deserialization fails. This behavior is the reason the execution tends to be successful without triggering errors that would otherwise alert security mechanisms.

Recommendation

If you are using ML models from Hugging Face, we recommend:

  1. Thoroughly inspect models obtained from public repositories.
  2. Ensure tools like Picklescan are updated.
  3. Disable pickle serialization where feasible.
  4. Isolate/monitor ML models.
WME Logo Separator PNG

DeepSeek App Exposes Sensitive Data with Weak Security Measures

Overview

Credible security assessments just unveiled some alarming flaws in DeepSeek iOS app. DeepSeek has been identified as recklessly handling important device data, revealed in the recent audit which also exposed their catastrophic overlooking. The app transmits data via the internet unencrypted, which means your prime data is now a catchy target for interception.

This egregious flaw is then compounded with the app’s blatant disregard for essential security standards. You can say they have placed user privacy at some unprecedented risk.

Impact

The lack of encryption definitely opens the door to attacks including both passive and active ones. Any crucial data is unsafe there i.e., any critical mobile registration details, device information, etc. The existing encryption method, if any, is also unsecured because of the infamous algorithm (3DES) which uses a hardcoded key and reused initialization vectors.

The app has also disabled iOS’s App Transport Security feature, which means unencrypted data can now be transmitted, only exacerbating the issue. There is also an added risk: this data is quite likely to be sent over to the Volcano Engine servers operator which is linked to TikTok.

Recommendation

DeepSeek users should avoid transmitting their important data through the app. They should wait for the security flaws to be addressed first. In fact, you can consider alternatives that have implemented secure encrypted communication channels.

WME Logo Separator PNG

Windows Management Experts

Now A Microsoft Solutions Partner for:

✓ Data & AI

✓ Digital and App Innovation

✓ Infrastructure

✓ Security

The Solutions Partner badge highlights WME’s excellence and commitment. Microsoft’s thorough evaluation ensures we’re skilled, deliver successful projects, and prioritize security over everything. This positions WME in a global tech community, ready to innovate on the cloud for your evolving business needs.

Why not reach out to us at WME?

Contact us and let us transform your business’s security into a strategic advantage for your business. Be sure, with WME, you’re just beginning a path toward a more streamlined and secure future.

Contact us: Sales@winmgmtexperts.com

Share:

Facebook
Twitter
LinkedIn
Picture of Matt Tinney

Matt Tinney

Professional IT executive & business leader having decades of experience with Microsoft technologies delivering modern-day cloud & security solutions.

Contact Us

Please enable JavaScript in your browser to complete this form.
Name
  • United States+1
  • United Kingdom+44
  • Afghanistan+93
  • Albania+355
  • Algeria+213
  • American Samoa+1
  • Andorra+376
  • Angola+244
  • Anguilla+1
  • Antigua & Barbuda+1
  • Argentina+54
  • Armenia+374
  • Aruba+297
  • Ascension Island+247
  • Australia+61
  • Austria+43
  • Azerbaijan+994
  • Bahamas+1
  • Bahrain+973
  • Bangladesh+880
  • Barbados+1
  • Belarus+375
  • Belgium+32
  • Belize+501
  • Benin+229
  • Bermuda+1
  • Bhutan+975
  • Bolivia+591
  • Bosnia & Herzegovina+387
  • Botswana+267
  • Brazil+55
  • British Indian Ocean Territory+246
  • British Virgin Islands+1
  • Brunei+673
  • Bulgaria+359
  • Burkina Faso+226
  • Burundi+257
  • Cambodia+855
  • Cameroon+237
  • Canada+1
  • Cape Verde+238
  • Caribbean Netherlands+599
  • Cayman Islands+1
  • Central African Republic+236
  • Chad+235
  • Chile+56
  • China+86
  • Christmas Island+61
  • Cocos (Keeling) Islands+61
  • Colombia+57
  • Comoros+269
  • Congo - Brazzaville+242
  • Congo - Kinshasa+243
  • Cook Islands+682
  • Costa Rica+506
  • Croatia+385
  • Cuba+53
  • Curaçao+599
  • Cyprus+357
  • Czechia+420
  • Côte d’Ivoire+225
  • Denmark+45
  • Djibouti+253
  • Dominica+1
  • Dominican Republic+1
  • Ecuador+593
  • Egypt+20
  • El Salvador+503
  • Equatorial Guinea+240
  • Eritrea+291
  • Estonia+372
  • Eswatini+268
  • Ethiopia+251
  • Falkland Islands+500
  • Faroe Islands+298
  • Fiji+679
  • Finland+358
  • France+33
  • French Guiana+594
  • French Polynesia+689
  • Gabon+241
  • Gambia+220
  • Georgia+995
  • Germany+49
  • Ghana+233
  • Gibraltar+350
  • Greece+30
  • Greenland+299
  • Grenada+1
  • Guadeloupe+590
  • Guam+1
  • Guatemala+502
  • Guernsey+44
  • Guinea+224
  • Guinea-Bissau+245
  • Guyana+592
  • Haiti+509
  • Honduras+504
  • Hong Kong SAR China+852
  • Hungary+36
  • Iceland+354
  • India+91
  • Indonesia+62
  • Iran+98
  • Iraq+964
  • Ireland+353
  • Isle of Man+44
  • Israel+972
  • Italy+39
  • Jamaica+1
  • Japan+81
  • Jersey+44
  • Jordan+962
  • Kazakhstan+7
  • Kenya+254
  • Kiribati+686
  • Kosovo+383
  • Kuwait+965
  • Kyrgyzstan+996
  • Laos+856
  • Latvia+371
  • Lebanon+961
  • Lesotho+266
  • Liberia+231
  • Libya+218
  • Liechtenstein+423
  • Lithuania+370
  • Luxembourg+352
  • Macao SAR China+853
  • Madagascar+261
  • Malawi+265
  • Malaysia+60
  • Maldives+960
  • Mali+223
  • Malta+356
  • Marshall Islands+692
  • Martinique+596
  • Mauritania+222
  • Mauritius+230
  • Mayotte+262
  • Mexico+52
  • Micronesia+691
  • Moldova+373
  • Monaco+377
  • Mongolia+976
  • Montenegro+382
  • Montserrat+1
  • Morocco+212
  • Mozambique+258
  • Myanmar (Burma)+95
  • Namibia+264
  • Nauru+674
  • Nepal+977
  • Netherlands+31
  • New Caledonia+687
  • New Zealand+64
  • Nicaragua+505
  • Niger+227
  • Nigeria+234
  • Niue+683
  • Norfolk Island+672
  • North Korea+850
  • North Macedonia+389
  • Northern Mariana Islands+1
  • Norway+47
  • Oman+968
  • Pakistan+92
  • Palau+680
  • Palestinian Territories+970
  • Panama+507
  • Papua New Guinea+675
  • Paraguay+595
  • Peru+51
  • Philippines+63
  • Poland+48
  • Portugal+351
  • Puerto Rico+1
  • Qatar+974
  • Romania+40
  • Russia+7
  • Rwanda+250
  • Réunion+262
  • Samoa+685
  • San Marino+378
  • Saudi Arabia+966
  • Senegal+221
  • Serbia+381
  • Seychelles+248
  • Sierra Leone+232
  • Singapore+65
  • Sint Maarten+1
  • Slovakia+421
  • Slovenia+386
  • Solomon Islands+677
  • Somalia+252
  • South Africa+27
  • South Korea+82
  • South Sudan+211
  • Spain+34
  • Sri Lanka+94
  • St. Barthélemy+590
  • St. Helena+290
  • St. Kitts & Nevis+1
  • St. Lucia+1
  • St. Martin+590
  • St. Pierre & Miquelon+508
  • St. Vincent & Grenadines+1
  • Sudan+249
  • Suriname+597
  • Svalbard & Jan Mayen+47
  • Sweden+46
  • Switzerland+41
  • Syria+963
  • São Tomé & Príncipe+239
  • Taiwan+886
  • Tajikistan+992
  • Tanzania+255
  • Thailand+66
  • Timor-Leste+670
  • Togo+228
  • Tokelau+690
  • Tonga+676
  • Trinidad & Tobago+1
  • Tunisia+216
  • Turkey+90
  • Turkmenistan+993
  • Turks & Caicos Islands+1
  • Tuvalu+688
  • U.S. Virgin Islands+1
  • Uganda+256
  • Ukraine+380
  • United Arab Emirates+971
  • United Kingdom+44
  • United States+1
  • Uruguay+598
  • Uzbekistan+998
  • Vanuatu+678
  • Vatican City+39
  • Venezuela+58
  • Vietnam+84
  • Wallis & Futuna+681
  • Western Sahara+212
  • Yemen+967
  • Zambia+260
  • Zimbabwe+263
  • Åland Islands+358
1 * 9 =
On Key

More Posts