Tuesday, April 8, 2025
HomeCVE/vulnerabilityMassive Cyber Attack Across the World Against ISPs & Data Centres: More...

Massive Cyber Attack Across the World Against ISPs & Data Centres: More than 200,000 Cisco Switches Hacked

Published on

SIEM as a Service

Follow Us on Google News

Biggest Hackers Group Performing Massive Cyber attack against internet service providers, and data centers around the world by compromising Cisco switches.

Hackers compromised more than 200,000 Cisco devices across the world in this widespread attack, including 3,500 switches in Iran country.

A recently discovered  Remote Code Execution flaw that affected the Cisco switches  Smart Install Client allows an attacker to gain full control of the Vulnerable Cisco switch deployed networks.

- Advertisement - Google News

Iranian & Russian countries are mainly affected and hackers have left the image of a U.S. flag on screens that also contains a warning message: “Don’t mess with our elections”

This Cyber Attack initially hit the Internet service providers and stop the web access for subscribers by exploiting the vulnerability in Cisco switches that contains a critical Remote code execution Flaw.

This Attack was initiated by an unknown threat actor that is exploiting a vulnerability in a piece of software called Cisco Smart Install Client, which allows them to run arbitrary code and this leads the attacker to reset the vulnerable Cisco Switches to its default configuration.

Based on the Cisco investigation using Shodan and they were identified more than 168,000 systems have already been successfully exploited and another investigation made by Tenable Security revealed 251,000 exposed Cisco Smart Install Clients around the world.

According to Motherboard Report, The hackers said they did scan many countries for vulnerable systems, including the UK, US, and Canada, but only “attacked” Russia and Iran, perhaps referring to the post of an American flag and their message.

Iran’s IT Minister Mohammad Javad Azari-Jahromi posted a picture of a computer screen on Twitter with the image of the U.S. flag and the hackers’ message.

He said it was not yet clear who had carried out the Cyber Attack.

He said in another Tweet, “Approximately 3,500 routers come from a total of hundreds of thousands of nationwide network routers affected by the Cyber Attack.The performance of companies has been evaluated in repelling and restoring normal conditions. Weakness in informing the skilled center to companies and the weakness in the configuration of data centers have been”

Based on the Reuters Statment, This Cyber Attack mainly affected  Europe, India and the United States, in this case, Some 55,000 devices were affected in the United States and 14,000 in China.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified...

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app...

ToddyCat Attackers Exploited ESET Command Line Scanner Vulnerability to Conceal Their Tool

In a sophisticated cyberattack, the notorious ToddyCat APT group utilized a previously unknown vulnerability...

Threat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection

Cybercriminals are intensifying phishing campaigns to spread the Grandoreiro banking trojan, targeting users primarily...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

20-Year-Old Scattered Spider Hacker Pleads Guilty in Major Ransomware Case

A 20-year-old Noah Urban, a resident of Palm Coast, Florida, pleaded guilty to a...

MediaTek Releases Security Patch to Fix Vulnerabilities in Mobile and IoT Devices

MediaTek, a prominent semiconductor company specializing in mobile, IoT, and multimedia chipsets, has announced...

Python JSON Logger Vulnerability Enables Remote Code Execution – PoC Released

A recent security disclosure has revealed a remote code execution (RCE) vulnerability, CVE-2025-27607, in...