Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)

0
Medium
Exploitrcejava
Published: Tue Mar 03 2026 (03/03/2026, 15:01:17 UTC)
Source: SANS ISC Handlers Diary

Description

CrushFTP, a Java-based open source file transfer system, is currently subject to brute-force login attempts targeting weakly configured admin credentials, specifically the username and password both set to 'crushadmin'. While CrushFTP has had several serious vulnerabilities in the past, including remote code execution and authentication bypass flaws, the current threat is not exploiting a specific vulnerability but rather relying on poor password hygiene. Attackers are sending POST requests with credentials in URL parameters, attempting to gain unauthorized access. These brute-force attempts originate from a known malicious French IP address active since February 2026. Organizations running CrushFTP instances with default or weak admin credentials are at risk of compromise. No active exploits of new vulnerabilities are reported at this time, but successful brute force could lead to full system compromise. Defenders should audit and strengthen admin credentials and monitor for suspicious login attempts.

AI-Powered Analysis

AILast updated: 03/04/2026, 02:06:14 UTC

Technical Analysis

CrushFTP is a cross-platform, Java-based file transfer server software that has historically been affected by critical vulnerabilities, including CVE-2024-4040 (template injection allowing unauthenticated remote code execution), CVE-2025-31161 (authentication bypass granting admin access), and a zero-day CVE-2025-54309 exploited in the wild in mid-2025. Despite these past issues, the current threat landscape involves brute-force scanning rather than exploitation of a new vulnerability. Attackers are targeting CrushFTP instances by attempting to log in using the commonly suggested default admin username 'crushadmin' with the same password 'crushadmin'. The login attempts are conducted via POST requests where credentials are passed as GET parameters, which is unusual but accepted by the server. These brute-force scans originate from a French IP address (5.189.139.225) with a history of probing for simple vulnerabilities. The attack leverages weak or default credentials set by administrators who may have neglected to change suggested usernames and passwords during setup. Successful brute-force login could allow attackers to gain administrative control over the CrushFTP server, potentially leading to unauthorized file access, data exfiltration, or further system compromise. No new CVEs or zero-day exploits are involved in this activity, and no known active exploitation of vulnerabilities is currently reported. The threat highlights the importance of secure configuration and credential management in CrushFTP deployments.

Potential Impact

If attackers successfully brute-force the admin credentials on a CrushFTP server, they can gain full administrative access, allowing them to upload, download, modify, or delete files, potentially leading to data breaches, data loss, or service disruption. Administrative control could also enable attackers to pivot within the network, deploy malware, or establish persistent access. Organizations relying on CrushFTP for sensitive file transfers may face confidentiality and integrity breaches. The impact is amplified if the server hosts critical or regulated data. Additionally, compromised servers could be used as a launchpad for further attacks or to distribute malicious files. While no active exploitation of new vulnerabilities is reported, the ease of brute-force attacks on weak credentials poses a significant risk, especially for organizations that have not enforced strong password policies or multi-factor authentication. The threat affects availability indirectly if attackers disrupt services or delete files. Overall, the impact ranges from moderate to high depending on the sensitivity of data and the network environment.

Mitigation Recommendations

1. Immediately audit all CrushFTP instances to identify weak or default admin credentials, especially the use of 'crushadmin' as username and password. 2. Enforce strong, unique passwords for all administrative accounts; avoid suggested default usernames and passwords. 3. Implement account lockout policies or rate limiting to mitigate brute-force attempts. 4. Enable multi-factor authentication (MFA) if supported by CrushFTP or via external access controls. 5. Monitor server logs for repeated failed login attempts and block suspicious IP addresses, including the identified malicious IP 5.189.139.225. 6. Restrict access to the CrushFTP administrative interface to trusted IP ranges or via VPN. 7. Keep CrushFTP software updated with the latest patches and security fixes. 8. Conduct regular security assessments and penetration testing focused on authentication mechanisms. 9. Educate administrators on secure configuration practices and the risks of default credentials. 10. Consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block brute-force patterns.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32762","fetched":true,"fetchedAt":"2026-03-04T02:05:18.788Z","wordCount":397}

Threat ID: 69a79367d1a09e29cbc29e9e

Added to database: 3/4/2026, 2:05:27 AM

Last enriched: 3/4/2026, 2:06:14 AM

Last updated: 3/4/2026, 7:51:17 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses