Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Mirai botnet targets 22 flaws in D-Link, Zyxel, Netgear devices
#1
https://www.bleepingcomputer.com/news/se...r-devices/    Mirai botnet targets 22 flaws in D-Link, Zyxel, Netgear devices
By Bill Toulas
June 22, 2023 01:53 PM      A variant of the Mirai botnet is targeting almost two dozen vulnerabilities aiming to take control of D-Link, Arris, Zyxel, TP-Link, Tenda, Netgear, and MediaTek devices to use them for distributed denial-of-service (DDoS) attacks.

The malware has been identified by Unit 42 researchers of Palo Alto Networks in two ongoing campaigns that started on March 14 and spiked in April and June.

In a report today, the researchers warn that the botnet developers continue to add code for exploitable vulnerabilities.    In total, the malware targets no less than 22 known seccurity issues in various connected products, which include routers, DVRs, NVRs, WiFi communication dongles, thermal monitoring systems, access control systems, and solar power generation monitors.

Below is the complete list of the vulnerabilities and products targeted by the malware in the latest version tha Unit 42 researchers identified:    Exploited flaws table (Palo Alto Networks)
One of these flaws, CVE-2023-1389, affects the TP-Link Archer A21 (AX1800) WiFi router and it was reported by ZDI as being exploitated from Mirai malware since late April. However, it is unclear if the two refer to the same activity.

Attack details
The attack begins with exploiting one of the mentioned flaws, laying the ground for executing a shell script from an external resource.

This script will download the botnet client that matches the architecture of the compromised device, covering armv4l, arm5l, arm6l, arm7l, mips, mipsel, sh4, x86_64, i686, i586, arc, m68k, and sparc.

After the bot client executes, the shell script downloader deletes the client’s file to sweep infection tracks and to reduce the likelihood of detection.

Compared to standard Mirai variants in circulation, this one directly accesses the encrypted strings in the .rodata section through an index instead of setting up a string table to get the botnet client’s configuration.

This approach bypasses the encrypted string table initialization, giving the malware speed and stealthiness and making it less likely to be detected by security tools.


Retrieving the configuration strings (Palo Alto Networks)
Unit 42 also notes that this Mirai variant does not have the capacity to brute force telnet/SSH login credentials, so its distribution relies entirely on operators manually exploiting the vulnerabilities.

Lowering the risk of infection is possible by applying the latest firmware update available from the device vendor or maker, switch from the default access credentials to something strong and unique, and remove remote admin panel accessibility if not needed.

Signs of botnet malware infection on an IoT device may include excessive overheating, change of settings/configuration, frequent disconnections, and an overall drop in performance.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  (Bitdefender ) 2024 Cybersecurity Forecast: Ransomware's New Tactics and Targets mrtrout 0 865 01-05-2024 , 08:49 PM
Last Post: mrtrout
  What is a Botnet? Bitdefender mrtrout 0 460 06-22-2023 , 10:13 PM
Last Post: mrtrout
  Mozi IoT Botnet Now Also Targets Netgear, Huawei, and ZTE Network Gateways mrtrout 0 855 08-21-2021 , 10:35 PM
Last Post: mrtrout
  Destroying a botnet Panda Security mrtrout 0 785 05-25-2021 , 06:53 AM
Last Post: mrtrout
  Latest Mirai Variant Targets SonicWall, D-Link and IoT Devices Bjyda 0 943 03-17-2021 , 04:27 PM
Last Post: Bjyda

Forum Jump:


Users browsing this thread: 2 Guest(s)