Threat Analysts have reported alarming findings about the “Araneida Scanner,” a malicious tool allegedly based on a cracked version of Acunetix, a renowned web application vulnerability scanner.
The tool has been linked to illegal activities, including offensive reconnaissance, scraping user data, and identifying vulnerabilities for exploitation.
The “Araneida Scanner” is being sold on platforms like Telegram and actively exploited by threat actors.
Telegram channels tied to Araneida boast of major cyber exploits, including taking over 30,000 websites in six months.
A recent investigation linked the Araneida Scanner to a Turkish software developer based in Ankara.
Analysts have also uncovered a parallel operation involving another cracked Acunetix-based tool with login panels in Mandarin, suggesting Chinese threat actor involvement.
Researchers initiated their investigation after receiving intelligence from a partner organization about unusual scanning activities involving an IP address linked to previous cyberattacks.
The scanner, identified as “Araneida – WebApp Scanner,” is being sold through the domain [araneida(.)co], created in February 2023.
The investigation confirmed that the tool uses components of cracked Acunetix software.
Partnering with Invicti, the parent company of Acunetix, Silent Push verified that the legitimate Acunetix scanner remains unaffected. This attack leverages unauthorized, cracked software versions without Invicti’s involvement.
The Araneida Scanner is widely marketed to cybercriminals for its offensive capabilities:
Researchers identified cracked Acunetix scanners hosted on IPs featuring Mandarin login portals and legacy Acunetix SSL certificates.
These portals, dating back to 2021, offer download links for malicious executables disguised as legitimate tools like “FlkVPN.”
Although no definitive connection has been established, researchers suspect involvement from APT41, a known Chinese cyber-espionage group.
APT41 has a history of exploiting Acunetix for reconnaissance efforts, as highlighted in reports by the U.S. Department of Health and Human Services earlier this year.
This is not the first instance of Acunetix misuse.
Researchers have developed actionable intelligence to help organizations mitigate risks from cracked Acunetix tools.
Silent Push provides detailed feeds containing domains and IPs associated with the Araneida Scanner infrastructure.
The exploitation of cracked cybersecurity tools like Acunetix underscores the double-edged nature of technology. While tools like Acunetix are designed to enhance web security, their misuse by malicious actors poses significant threats.
The discovery of Araneida’s link to a Turkish software developer and its growing influence among cybercriminals highlights the urgent need for vigilance and collaborative threat intelligence-sharing to combat such activities.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…
Adobe has issued a critical security update for ColdFusion versions 2023 and 2021 to address…