Threat Analysts have reported alarming findings about the “Araneida Scanner,” a malicious tool allegedly based on a cracked version of Acunetix, a renowned web application vulnerability scanner.
The tool has been linked to illegal activities, including offensive reconnaissance, scraping user data, and identifying vulnerabilities for exploitation.
The “Araneida Scanner” is being sold on platforms like Telegram and actively exploited by threat actors.
Telegram channels tied to Araneida boast of major cyber exploits, including taking over 30,000 websites in six months.
A recent investigation linked the Araneida Scanner to a Turkish software developer based in Ankara.
Analysts have also uncovered a parallel operation involving another cracked Acunetix-based tool with login panels in Mandarin, suggesting Chinese threat actor involvement.
Researchers initiated their investigation after receiving intelligence from a partner organization about unusual scanning activities involving an IP address linked to previous cyberattacks.
The scanner, identified as “Araneida – WebApp Scanner,” is being sold through the domain [araneida(.)co], created in February 2023.
The investigation confirmed that the tool uses components of cracked Acunetix software.
Partnering with Invicti, the parent company of Acunetix, Silent Push verified that the legitimate Acunetix scanner remains unaffected. This attack leverages unauthorized, cracked software versions without Invicti’s involvement.
The Araneida Scanner is widely marketed to cybercriminals for its offensive capabilities:
Researchers identified cracked Acunetix scanners hosted on IPs featuring Mandarin login portals and legacy Acunetix SSL certificates.
These portals, dating back to 2021, offer download links for malicious executables disguised as legitimate tools like “FlkVPN.”
Although no definitive connection has been established, researchers suspect involvement from APT41, a known Chinese cyber-espionage group.
APT41 has a history of exploiting Acunetix for reconnaissance efforts, as highlighted in reports by the U.S. Department of Health and Human Services earlier this year.
This is not the first instance of Acunetix misuse.
Researchers have developed actionable intelligence to help organizations mitigate risks from cracked Acunetix tools.
Silent Push provides detailed feeds containing domains and IPs associated with the Araneida Scanner infrastructure.
The exploitation of cracked cybersecurity tools like Acunetix underscores the double-edged nature of technology. While tools like Acunetix are designed to enhance web security, their misuse by malicious actors poses significant threats.
The discovery of Araneida’s link to a Turkish software developer and its growing influence among cybercriminals highlights the urgent need for vigilance and collaborative threat intelligence-sharing to combat such activities.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox,…
A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has…
The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its initial…
Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection…
A financial management app named Finance Simplified has been revealed as a malicious tool for…
A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting trojan,…