New Zerobot Botnet Attacks Vulnerable IoT Devices Zyxel, D-Link, BIG-IP and More

The new Zerobot botnet, written in Go, spreads through the exploitation of almost two dozen vulnerabilities in IoT devices and various software (including F5 BIG-IP, Zyxel firewalls, Totolink and D-Link routers, and Hikvision cameras).

Fortinet analysts report that the botnet has several modules, including those for self-replication, self-propagation, and attacks on various protocols. It is also known to communicate with its management servers using WebSocket.

Lascia che ti ricordi che abbiamo scritto anche quello Forpiex botnet sends out 30,000 lettere di sextortion all'ora, e anche quello Gucci botnet infects IoT devices in Europe.

The new malware attacks began on November 18, 2022 and target various architectures including i386, AMD64, ARM, ARM64, MIPS, MIPS64, MIPS64le, MIPSle, PPC64, PPC64le, RISC64, and S390x. Zerobot got its name from a script that it uses to propagate and extract a malicious payload after gaining access to a host (Per esempio, “zero.arm64”).

To date, two versions of Zerobot have been discovered: one used before November 24, 2022, with basic functionality, and an updated version that includes a module for self-propagation and hacking other endpoints.

In its attacks, the second version of the malware uses exploits for 21 vulnerabilities to gain access to devices. The malware then downloads a script containingzeroin its name, which allows it to spread further on its own.

New Zerobot botnet

The researchers list that Zerobot exploits the following vulnerabilities:

  1. CVE-2014-08361: miniigd SOAP service in Realtek SDK;
  2. CVE-2017-17106: Zivif PR115-204-P-RS webcams;
  3. CVE-2017-17215: Huawei HG523 router;
  4. CVE-2018-12613: phpMyAdmin;
  5. CVE-2020-10987: Tenda AC15 AC1900 router;
  6. CVE-2020-25506: NAS D-Link DNS-320;
  7. CVE-2021-35395: Realtek Jungle SDK;
  8. CVE-2021-36260: Hikvision products;
  9. CVE-2021-46422: Telesquare SDT-CW3B1 router;
  10. CVE-2022-01388: F5 BIG-IP;
  11. CVE-2022-22965: Spring MVC and Spring WebFlux (Spring4Shell vulnerability);
  12. CVE-2022-25075: TOTOLink A3000RU router;
  13. CVE-2022-26186: TOTOLink N600R router;
  14. CVE-2022-26210: TOTOLink A830R router;
  15. CVE-2022-30525: Zyxel USG Flex 100(W) Firewall;
  16. CVE-2022-34538: MEGApix IP cameras;
  17. CVE-2022-37061: FLIX AX8 thermal cameras.

Inoltre, the botnet uses four more exploits for bugs that have not been assigned CVE identifiers. Two of these vulnerabilities are related to GPON terminals and D-Link routers. There are no details about the others yet.

After gaining a foothold on a compromised device, Zerobot contacts the command-and-control server and transmits basic information about the victim to its operators. C&C can respond with one of the following commands:

  1. pingkeep a connection;
  2. attacklaunch an attack for different protocols (TCP, UDP, TLS, HTTP, ICMP);
  3. stopstop the attack;
  4. updateinstall the update and restart Zerobot;
  5. enable_scanscan open ports and start spreading via exploits or SSH/Telnet brute force;
  6. disable_scanstop scanning;
  7. comandoexecute a command (cmd on Windows and bash on Linux);
  8. killkill the bot.

The researchers also write that the malware has an anti-kill module, which is designed to prevent the completion or destruction of its process.

While Zerobot is focused on organizing DDoS attacks, Tuttavia, the report notes that it can also be used as a vector for initial access to victim networks.

And the media recently wrote, Per esempio, that Law Enforcement Officers Eliminated the Russian Botnet RSOCKS.

Circa l'autore

Carina Wilson

Con oltre 10 anni di esperienza nella scrittura per media online e cartacei, Sono un esperto nel fornire testi chiari e convincenti.

Ho scritto per un'importante agenzia di copywriting SEO e per alcuni dei marchi più noti del Regno Unito, riviste e giornali.

Lascia un commento