New Mirai botnet targets tens of flaws in popular IoT devices

Pierluigi Paganini June 22, 2023

Since March 2023, Unit 42 researchers have observed a variant of the Mirai botnet spreading by targeting tens of flaws in D-Link, Zyxel, and Netgear devices.

Since March 2023, researchers at Palo Alto Networks Unit 42 have observed a new variant of the Mirai botnet targeting multiple vulnerabilities in popular IoT devices. Below is the list of the targeted vulnerabilities:

CVE/ProductDescription
CVE-2019-12725Zeroshell Remote Command Execution Vulnerability
CVE-2019-17621D-Link DIR-859 Remote Command Injection Vulnerability
CVE-2019-20500D-Link DWL-2600AP Remote Command Execution Vulnerability
CVE-2021-25296Nagios XI Remote Command Injection Vulnerability
CVE-2021-46422Telesquare SDT-CW3B1 Router Command Injection Vulnerability
CVE-2022-27002Arris TR3300 Remote Command Injection Vulnerability
CVE-2022-29303SolarView Compact Command Injection Vulnerability
CVE-2022-30023Tenda HG9 Router Command Injection Vulnerability
CVE-2022-30525Zyxel Command Injection Vulnerability
CVE-2022-31499Nortek Linear eMerge Command Injection Vulnerability
CVE-2022-37061FLIR AX8 Unauthenticated OS Command Injection Vulnerability
CVE-2022-40005Intelbras WiFiber 120 AC inMesh Command Injection Vulnerability
CVE-2022-45699APsystems ECU-R Remote Command Execution Vulnerability
CVE-2023-1389TP-Link Archer Router Command Injection Vulnerability
CVE-2023-25280D-link DIR820LA1_FW105B03 Command injection vulnerability
CVE-2023-27240Tenda AX3 Command Injection Vulnerability
CCTV/DVRCCTV/DVR Remote Code Execution
EnGenius EnShareEnGenius EnShare Remote Code Execution Vulnerability
MVPower DVRMVPower DVR Shell Unauthenticated Command Execution Vulnerability
Netgear DGN1000Netgear DGN1000 Remote Code Execution Vulnerability
Vacron NVRVacron NVR Remote Code Execution Vulnerability
MediaTek WiMAXMediaTek WiMAX Remote Code Execution

The botnet aims at taking control of D-Link, Arris, Zyxel, TP-Link, Tenda, Netgear, and MediaTek devices and uses them to carry out distributed denial-of-service (DDoS) attacks. The list of targeted devices includes routers, DVRs, access control systems, and Solar power generation monitoring systems.

The researchers observed two campaigns, respectively in March and June.

Mirai botnet

Since the beginning of the attacks observed in October 2022, threat actors have enhanced the botnet by integrating exploits for new vulnerabilities.

The attack chain commences with the exploitation of one of the above issues, then the threat actor tries to download a shell script downloader from a remote server.

Upon executing the script, it would download and execute the proper bot clients for the specific Linux architectures:

  • hxxp://185.225.74[.]251/armv4l
  • hxxp://185.225.74[.]251/armv5l
  • hxxp://185.225.74[.]251/armv6l
  • hxxp://185.225.74[.]251/armv7l
  • hxxp://185.225.74[.]251/mips
  • hxxp://185.225.74[.]251/mipsel
  • hxxp://185.225.74[.]251/sh4
  • hxxp://185.225.74[.]251/x86_64
  • hxxp://185.225.74[.]251/i686
  • hxxp://185.225.74[.]251/i586
  • hxxp://185.225.74[.]251/arc
  • hxxp://185.225.74[.]251/m68k
  • hxxp://185.225.74[.]251/sparc

Once executed the bot client, the shell script downloader will delete the client executable file to avoid detection.

“Based on behavior and patterns Unit 42 researchers observed while analyzing the downloaded botnet client samples, we believe the sample is a variant of the Mirai botnet.” reads the report published by Unit42. “Upon execution, the botnet client prints listening tun0 to the console. The malware also contains a function that ensures only one instance of this malware runs on the same device. If a botnet process already exists, the botnet client will terminate the current running process and start a new one.”

The researchers pointed out that the Mirai variant like IZ1H9 and V3G4 will first initialize an encrypted string table and then retrieve the strings through an index. However, this Mirai variant will directly access the encrypted strings in the .rodata section via an index

The approach allows the malware to remain under the radar and be faster.

This Mirai variant lack of brute forcing login credentials capability, which means that operators have to manually deploy it by exploiting the above vulnerabilities.

“The widespread adoption of IoT devices has become a ubiquitous trend. However, the persistent security concerns surrounding these devices cannot be ignored. The Mirai botnet, discovered back in 2016, is still active today. A significant part of the reason for its popularity among threat actors lies in the security flaws of IoT devices.” concludes the report. “These remote code execution vulnerabilities targeting IoT devices exhibit a combination of low complexity and high impact, making them an irresistible target for threat actors. As a result, protecting IoT devices against such threats becomes an urgent task.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Mirai botnet)



you might also like

leave a comment