New Mirai-Based Botnet Exploits Zero-Day Vulnerabilities in Industrial and Smart Devices

Teilen:

sophisticated Mirai-based botnet is leveraging zero-day exploits and custom vulnerabilities to compromise industrial routers and smart home devices. First observed in February 2024, this botnet has rapidly evolved, exploiting both n-day und zero-day flaws, including a critical vulnerability, CVE-2024-12856, in Four-Faith industrial routers.

Emerging Exploitation Activity

Researchers from Chainxin X Lab reported that exploitation of CVE-2024-12856 began in late December 2024, shortly after its discovery by VulnCheck. This vulnerability, combined with custom exploits for flaws in Neterbit routers und Vimar smart home devices, has expanded the botnet’s infection capabilities.

Botnet Profile

The botnet, whose name contains offensive language, is built on a Mirai-based framework and maintains an average of 15,000 active daily bot nodes across the following countries:

  • China
  • Vereinigte Staaten
  • Russia
  • Türkei
  • Iran

Key Features:

  • Attack Objectives: Primarily used for DDoS attacks targeting hundreds of entities daily. Activity peaked in October and November 2024.
  • Propagation Mechanism: Combines public and private exploits for over 20 vulnerabilities to infect diverse devices.
  • Brute Force Module: Targets devices with weak Telnet passwords.
  • Custom Malware Attributes: Implements Mirai-like commands, uses custom UPX packing, and scans for additional vulnerabilities across networks.

Targeted countriesTargeted countries
Source: X Lab

Siehe auch: Du willst also ein Hacker werden?
Offensive Sicherheit, Bug Bounty Kurse

Entdecken Sie Ihr schwächstes Glied. Seien Sie proaktiv, nicht reaktiv. Cyberkriminelle brauchen nur eine Schwachstelle, um zuzuschlagen.

 

Targeted Devices and Vulnerabilities

The botnet exploits vulnerabilities in a wide range of devices, including:

Device Type Exploits Used
ASUS routers N-day exploits
Huawei routers CVE-2017-17215
Neterbit routers Custom exploit
LB-Link routers CVE-2023-26801
Four-Faith routers CVE-2024-12856 (zero-day)
PZT cameras CVE-2024-8956, CVE-2024-8957
Kguard DVRs Remote code execution vulnerabilities
Lilin DVRs RCE exploits
Vimar smart home devices Likely undisclosed vulnerabilities
5G/LTE devices Weak credentials and misconfigurations

The botnet actively infects DVRsroutersund smart home devices, further highlighting the vulnerabilities present in internet-exposed systems.

DDoS Attack Characteristics

X Lab’s telemetry revealed that the botnet’s DDoS attacks are:

  • Short in Duration: Lasting between 10-30 seconds.
  • High in Intensity: Surpassing 100 Gbps of traffic, capable of disrupting even robust infrastructures.
  • Global in Reach: Attack targets span Chinathe USDeutschlandthe UKund Singapur, affecting various industries.

Botnet attack volumes
Source: X Lab

Trending: Top 10 Things to Do After Installing Kali Linux

Trending: Network Security Tool: Sara (RouterOS Security Inspector)

Mitigation Recommendations

To defend against this botnet, users should:

  1. Install Updates: Apply the latest firmware updates to patch known vulnerabilities.
  2. Replace EOL Devices: Upgrade end-of-life devices to models receiving regular security updates.
  3. Secure Configurations:
    • Change default credentials to strong, unique passwords.
    • Disable unnecessary remote access interfaces.
  4. Network Monitoring: Use intrusion detection systems to identify anomalous behavior.

Trending: Kali Linux 2024.4: 14 New Tools, Python 3.12, and Raspberry Pi Enhancements

Sind Sie ein Sicherheitsforscher? Oder ein Unternehmen, das Artikel über Cybersicherheit, offensive Sicherheit (im Zusammenhang mit Informationssicherheit im Allgemeinen) schreibt, die zu unserem speziellen Publikum passen und es wert sind, geteilt zu werden? Wenn Sie Ihre Idee in einem Artikel ausdrücken möchten, kontaktieren Sie uns hier für ein Angebot: [email protected]

Quelle

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
5:21 am, Jan. 15, 2025
Wetter-Symbol 8°C
L: 8° | H: 9°
mist
Luftfeuchtigkeit: 96 %
Druck: 1034 mb
Wind: 0 mph
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 2 km
Sonnenaufgang: 7:59 am
Sonnenuntergang: 4:20 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
8° | 9°°C 0 mm 0% 3 mph 97 % 1035 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
5° | 9°°C 0 mm 0% 4 mph 97 % 1034 mb 0 mm/h
Fr. Jan. 17 9:00 pm
Wetter-Symbol
3° | 7°°C 0 mm 0% 4 mph 91 % 1035 mb 0 mm/h
Sa. Jan. 18 9:00 pm
Wetter-Symbol
2° | 7°°C 0 mm 0% 4 mph 87 % 1034 mb 0 mm/h
So. Jan. 19 9:00 pm
Wetter-Symbol
2° | 6°°C 0 mm 0% 4 mph 88 % 1025 mb 0 mm/h
Today 6:00 am
Wetter-Symbol
6° | 8°°C 0 mm 0% 2 mph 96 % 1034 mb 0 mm/h
Today 9:00 am
Wetter-Symbol
6° | 8°°C 0 mm 0% 3 mph 97 % 1034 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
9° | 9°°C 0 mm 0% 2 mph 90 % 1035 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
9° | 9°°C 0 mm 0% 3 mph 88 % 1034 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
7° | 7°°C 0 mm 0% 3 mph 96 % 1034 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 2 mph 97 % 1034 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
6° | 6°°C 0 mm 0% 3 mph 96 % 1034 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
6° | 6°°C 0 mm 0% 3 mph 96 % 1033 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€93,872.89
1.57%
Ethereum(ETH)
€3,120.65
1.34%
XRP(XRP)
€2.72
10.05%
Fesseln(USDT)
€0.97
0.01%
Solana(SOL)
€183.00
1.34%
Dogecoin(DOGE)
€0.348188
4.18%
USDC(USDC)
€0.97
0.00%
Shiba Inu(SHIB)
€0.000021
0.89%
Pepe(PEPE)
€0.000016
0.22%
Peanut das Eichhörnchen(PNUT)
€0.55
-4.28%
Nach oben scrollen