Categories: Cyber Security News

CISA Alerts on Active Exploitation of Rapid7 Velociraptor Vulnerability in Ransomware Attacks

CISA has added CVE-2025-6264 to its Known Exploited Vulnerabilities (KEV) catalog, warning that ransomware operators are actively abusing a default permissions flaw in Rapid7’s Velociraptor endpoint forensics tool.

The vulnerability enables arbitrary command execution and potential endpoint takeover when an attacker already has access sufficient to collect artifacts, aligning with incorrect default permissions under CWE-276.

Agencies are required to remediate by November 4, 2025, per KEV timelines, or discontinue use if mitigations are unavailable. CISA advises applying vendor mitigations and following BOD 22-01 guidance for cloud services.

Velociraptor Flaw Enables Takeover via Default Permissions

According to the CVE entry, Rapid7 Velociraptor contains an incorrect default permissions configuration that can be leveraged to execute arbitrary commands on endpoints and seize control, provided the attacker has artifact collection access.

This prerequisite is consistent with post-compromise or lateral movement stages in ransomware playbooks, where operators convert limited footholds into full control by abusing misconfigurations and elevated service contexts.

Improper defaults like these create systemic blast-radius risks across fleets when a single compromised account or agent can be turned into an execution conduit.

  • Attackers need only existing artifact-collection privileges.
  • Arbitrary command execution leads to full endpoint compromise.
  • Misconfigurations amplify risk across multiple systems.

Actively used in Ransomware Campaigns, says CISA

CISA explicitly marks CVE-2025-6264 as known to be used in ransomware campaigns, elevating urgency for both public and private sector defenders.

For environments running Velociraptor, defenders should assume exploitation attempts where threat actors already possess domain or endpoint-level access and are probing for deterministic privilege pathways.

This aligns with recent operator tradecraft: privilege hijacking through security tooling, command-and-control living-off-the-land approaches, and rapid lateral movement once artifact collection or agent control is obtained.

The KEV addition on October 14, 2025, underscores that exploitation is not theoretical; it is observed in the wild with real operational impact.

  • Ransomware groups hijack IT forensics tools to escalate privileges.
  • Observed in multiple intrusion campaigns over the past quarter.
  • Aligns with living-off-the-land tactics and minimal custom malware.

Immediate Mitigation and Hardening Steps for Teams

According to the report, CISA directs organizations to apply vendor mitigations without delay, adhere to BOD 22-01 for cloud service risk reduction, or suspend product use if a secure state cannot be achieved by the KEV due date.

Security teams should verify Velociraptor deployment permissions, rotate and least-privilege credentials tied to artifact collection, enforce strong RBAC and MFA, and review agent trust and signing configurations.

Increase telemetry on Velociraptor process execution, endpoint command invocations, and artifact collection actions; hunt for anomalous use aligned to operator TTPs.

Given active ransomware use, prioritize containment, validate segmentation, and ensure backups are isolated and tested to blunt potential takeover-to-encryption kill chains.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post CISA Alerts on Active Exploitation of Rapid7 Velociraptor Vulnerability in Ransomware Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Up to 80 Children Included in Michigan Pre-K Expansion Pilot

LANSING, MI (WOWO) Michigan is expanding its free pre-kindergarten initiative into home-based child care settings…

1 hour ago

AI Coding Agent Powered by Claude Opus 4.6 Deletes Production Database in 9 Seconds

A Cursor AI coding agent powered by Anthropic’s Claude Opus 4.6 deleted the entire production…

1 hour ago

Fort Wayne Legislators Raise Concerns Over Quarry Project

FORT WAYNE, IND. (WOWO) Opposition is mounting to a proposed limestone quarry development in Allen…

1 hour ago

Indiana Cracks Down on Illegal Drone Use in Rural Areas

INDIANAPOLIS, IND. (WOWO) Rural Indiana residents and state officials are confronting growing concerns over drone…

1 hour ago

‘Management failure’ and lack of training led to unauthorized contract, state officials say

Former Assistant Commissioner Paul Raymond had no experience with the prison system when he started…

2 hours ago

Another 98 units coming to Railyards in South End as project enters second phase

After a development handoff last year, construction will soon resume on one of the largest…

2 hours ago

This website uses cookies.