• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

New Mirai variant spotted targeting network devices

You are here: Home / General Cyber Security News / New Mirai variant spotted targeting network devices

Image of small robots connected to represent a botnet

Shutterstock

Security scientists have discovered another Mirai variant that is focusing on new Internet of Things (IoT) vulnerabilities. 

✔ Approved Seller by TheCyberSecurity.News From Our Partners
F Secure Safe 2021

Protect yourself against all threads using F-Seure. F-Seure is one of the first security companies which has never been backed up by any governments. It provides you with an award-winning security plus an optimum privacy.

Get F-Secure Safe with 65% discount from a bitdefender official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In accordance to a website article by researchers at Palo Alto Networks’ Device 42 Risk Intelligence Staff, the attacks were being first observed in mid-February. One IP address concerned in the attack was up to date to provide a Mirai variant leveraging CVE-2021-27561 and CVE-2021-27562, just hrs immediately after vulnerability specifics were being printed.

Previously this month, the same samples ended up served from a third IP address, with the addition of an exploit leveraging CVE-2021-22502. At the tail stop of previous 7 days, an exploit targeting CVE-2020-26919 was also incorporated into the samples.

The scientists mentioned that the attacks are also making use of three other IoT vulnerabilities still to be identified. These include two distant command execution vulnerabilities versus unidentified targets, and a vulnerability utilized by Moobot in the past.

In all of the attacks, hackers use the wget utility to obtain a shell script from the malware infrastructure. The shell script then downloads quite a few Mirai binaries compiled for distinctive architectures and executes these downloaded binaries just one by a single.

In addition to downloading Mirai, other destructive shell scripts have also been found out.

“The attacks are nonetheless ongoing at the time of this writing. Upon prosperous exploitation, the attackers consider to obtain a destructive shell script, which includes even further infection behaviors these kinds of as downloading and executing Mirai variants and brute-forcers,” reported Palo Alto Networks. 

Following a prosperous attack, hackers have then downloaded other binaries to agenda positions, make filter policies, carry out brute power attacks, or unfold the malware.

Between these are lolol.sh, which downloads the “dark” binaries and schedules a task that would operate each hour to rerun the lolol.sh script.

“However, the cron configuration is incorrect. This would have been an attempt to make sure the process is re-introduced in scenario it crashes or is killed for some other reason,” reported researchers.

Put in.sh downloads GoLang v1.9.4 on to the concentrate on process and provides it to the process path. It also downloads “nbrute” binaries and a “combo.txt” file. Nbrute.[arch] generally serves the goal of brute-forcing the various credentials located in “combo.txt” while initiating an SSH connection with a specific IP.

Combo.txt is a plain text file containing a lot of mixtures of credentials (often default credentials on products). Dark.[arch] is a binary centered on the Mirai codebase, and primarily serves the intent of propagation, or brute-forcing SSH connections making use of some really hard-coded credentials in the binary.

“The IoT realm remains an effortlessly obtainable goal for attackers. Many vulnerabilities are quite straightforward to exploit and could, in some instances, have catastrophic consequences,” the researchers extra.


Some sections of this report are sourced from:
www.itpro.co.uk

Previous Post: «mimecast dumps solarwinds after hackers breached its network Mimecast dumps SolarWinds after hackers breached its network

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • New Mirai variant spotted targeting network devices
  • Mimecast dumps SolarWinds after hackers breached its network
  • 50% of Incident Response Pros Want Better Work-Life Balance
  • SEC Charges Man Over Cannabis Firm Pump-and-Dump
  • Dropbox Passwords will be free for all users from April
  • Twitter hacker will serve three years in prison for infamous Bitcoin scam
  • Security professionals need to become wellness experts
  • Security professionals need to become wellness experts
  • Mimecast Finds SolarWinds Hackers Stole Some of Its Source Code
  • [Webinar] Oy Vey, We Hired a Large, Hairy Hacker…

Copyright © TheCyberSecurity.News, All Rights Reserved.