Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)
CrushFTP is a Java-based open source file transfer system. It is offered for multiple operating systems. If you run a CrushFTP instance, you may remember that the software has had some serious vulnera
What Happened
Security researchers at the SANS Internet Storm Center have detected a significant increase in automated, large-scale bruteforce scanning activity targeting CrushFTP servers globally. This activity, first observed on March 3rd, is a direct exploitation campaign aimed at leveraging known critical vulnerabilities within the Java-based file transfer software. The scans are systematically probing internet-facing CrushFTP instances to gain unauthorized access, likely to deploy ransomware, establish backdoors, or exfiltrate sensitive data.
Why It Matters
CrushFTP is widely deployed across enterprises for managed file transfer, often handling highly sensitive internal and customer data. A successful compromise can lead to catastrophic data breaches, significant operational disruption, and severe regulatory penalties. This coordinated scanning campaign indicates that threat actors, potentially ransomware affiliates or state-sponsored groups, are actively weaponizing public exploits. For any organization using CrushFTP, this represents an immediate and credible threat to data confidentiality and integrity, demanding urgent defensive action.
Technical Details
The bruteforce scans are exploiting at least three critical CVEs: CVE-2024-4040, CVE-2025-31161, and CVE-2025-54309. These vulnerabilities allow for remote code execution and authentication bypass, enabling attackers to gain complete control over the server without valid credentials. The attack vector is network-based, targeting the CrushFTP web management interface and service ports (default TCP/8080, 9090, 9022). Indicators of compromise include a high volume of failed login attempts from diverse IP addresses in logs, followed by successful authentication and anomalous process creation or file system writes.
Immediate Risk
The risk is CRITICAL and requires immediate remediation. Any internet-exposed CrushFTP server running an unpatched version is vulnerable to full compromise. The active scanning means attackers are continuously expanding their target list, and the time from initial probe to exploitation is shrinking. Organizations must treat this as a live incident until they can verify their systems are patched and not compromised. Delay increases the likelihood of a breach.
Security Insight
This campaign underscores the critical importance of rapid patch management for internet-facing services. Defenders must immediately isolate CrushFTP servers from the internet if possible, apply all relevant patches from the vendor, and conduct thorough log analysis for the listed IOCs. Given the severity, a proactive threat hunt is advised, even for patched systems, to rule out latent compromise. Long-term, organizations should enforce network segmentation for administrative interfaces and implement robust intrusion detection rules for anomalous authentication patterns on file transfer systems.
Never miss a security update
Get real-time security alerts delivered to your preferred platform.
Related News
Ivanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day attacks. [...]
Palo Alto Networks warned customers today that a critical-severity unpatched vulnerability in the PAN-OS User-ID Authentication Portal is being exploited in attacks. [...]
Progress Software warned customers to patch a critical authentication bypass vulnerability in its MOVEit Automation enterprise-grade managed file transfer (MFT) application. [...]