• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services

Hoaxcalls Botnet Exploits Symantec Secure World wide web Gateways

You are here: Home / Latest Cyber Security Vulnerabilities / Hoaxcalls Botnet Exploits Symantec Secure World wide web Gateways
May 15, 2020

The quick-relocating botnet has included an exploit for an unpatched bug in an unsupported edition of the safety gateway.

Cyberattackers are focusing on a submit-authentication distant code-execution vulnerability in Symantec Secure World-wide-web Gateways as section of new Mirai and Hoaxcalls botnet attacks.

Hoaxcalls first emerged in late March, as a variant of the Gafgyt/Bashlite loved ones it’s named soon after the area applied to host its malware, Hoaxcalls.pw. Two new Hoaxcalls samples showed up on the scene in April, incorporating new instructions from its command-and-control (C2) server. These provided the ability to proxy website traffic, down load updates, keep persistence throughout system restarts, avert reboots and launch a much larger variety of distributed denial-of-service (DDoS) attacks.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


It also incorporated a new exploit for infiltrating devices – an unpatched vulnerability impacting the ZyXEL Cloud CNM SecuManager that was disclosed in March. Now, researchers at Palo Alto Networks’ Device 42 division have observed that similar edition of the botnet exploiting a second unpatched bug, this time in Symantec Safe Web Gateway version 5..2.8, which is a products that became conclusion-of-life (EOL) in 2015 and finish-of-assistance-existence (EOSL) in 2019.

The Symantec bug was disclosed in March. Considering that it impacts older versions of the gateway, it will stay unpatched.

“On April 24, I noticed samples of the similar botnet incorporating an exploit concentrating on the EOL’d Symantec Secure Web Gateway v5..2.8, with an HTTP ask for in the structure: Write-up /spywall/timeConfig.php HTTP/1.1,” mentioned Device 42 researcher Ruchna Nigam, in a Thursday publish. “Some samples get to out to a URL for a community file upload service (plexle[.]us) in which the put up-exploitation payload is hosted. The URL contacted for the update serves a shell script that downloads and executes binaries from attacker-controlled URLs.”

Meanwhile, Nigam also observed a Mirai variant campaign in May well spreading employing that very same vulnerability oddly, the malware itself lacks any DDoS capabilities, in accordance to the researcher. As these kinds of, the binary would seem to be a very first-stage loader.

“Samples of this campaign surfaced early Could, developed on the Mirai supply code, and are packed with a modified version of UPX by using a distinct 4-byte critical with the UPX algorithm,” according to Nigam. “Another deviation from the Mirai source-code is the use of all of 10 8-byte keys that are cumulatively employed for a byte-wise string encryption scheme.”

The vulnerability as mentioned is a submit-authentication bug, indicating that the exploit is only effective for authenticated periods. It’s also no longer existing in the most recent model of the Symantec Net Gateway, version 5.2.8, so updated gadgets are protected.

Scientists at Radware earlier mentioned that Hoaxcalls operators seem quite fast to weaponize recently found bugs, like the ZyXel vulnerability. Device 42’s Nigam arrived to a similar conclusion:

“The use of the exploit in the wild surfaced only a few days after the publication of the vulnerability aspects, highlighting the reality that the authors of this certain botnet have been really lively in tests the performance of new exploits as and when they are designed public,” according to the researcher.

Worried about the IoT stability difficulties firms confront as extra related devices run our enterprises, push our production lines, monitor and deliver health care to people, and additional? On June 3 at 2 p.m. ET, be a part of renowned protection technologist Bruce Schneier, Armis CISO Curtis Simpson and Threatpost for a Absolutely free webinar, Taming the Unmanaged and IoT Device Tsunami. Get special insights on how to handle this new and growing assault surface area. Remember to sign-up listed here for this sponsored webinar.

 

 

Previous Post: « WordPress Page Builder Plugin Bugs Threaten 1 Million Sites with Full Takeover
Next Post: Adobe Patches Important RCE Flaw in Character Animator Application »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.