New Zerobot Botnet Attacks Vulnerable IoT Devices Zyxel, D-Link, BIG-IP and More

The new Zerobot botnet, written in Go, spreads through the exploitation of almost two dozen vulnerabilities in IoT devices and various software (including F5 BIG-IP, Zyxel firewalls, Totolink and D-Link routers, and Hikvision cameras).

Fortinet analysts report that the botnet has several modules, including those for self-replication, self-propagation, and attacks on various protocols. It is also known to communicate with its management servers using WebSocket.

Let me remind you that we also wrote that Phorpiex botnet sends out 30,000 每小時性勒索信數, and also that Gucci botnet infects IoT devices in Europe.

The new malware attacks began on November 18, 2022 and target various architectures including i386, AMD64, ARM, ARM64, MIPS, MIPS64, MIPS64le, MIPSle, PPC64, PPC64le, RISC64, and S390x. Zerobot got its name from a script that it uses to propagate and extract a malicious payload after gaining access to a host (例如, “zero.arm64”).

To date, two versions of Zerobot have been discovered: one used before November 24, 2022, with basic functionality, and an updated version that includes a module for self-propagation and hacking other endpoints.

In its attacks, the second version of the malware uses exploits for 21 vulnerabilities to gain access to devices. The malware then downloads a script containingzeroin its name, which allows it to spread further on its own.

New Zerobot botnet

The researchers list that Zerobot exploits the following vulnerabilities:

  1. CVE-2014-08361: miniigd SOAP service in Realtek SDK;
  2. CVE-2017-17106: Zivif PR115-204-P-RS webcams;
  3. CVE-2017-17215: Huawei HG523 router;
  4. CVE-2018-12613: phpMyAdmin;
  5. CVE-2020-10987: Tenda AC15 AC1900 router;
  6. CVE-2020-25506: NAS D-Link DNS-320;
  7. CVE-2021-35395: Realtek Jungle SDK;
  8. CVE-2021-36260: Hikvision products;
  9. CVE-2021-46422: Telesquare SDT-CW3B1 router;
  10. CVE-2022-01388: F5 BIG-IP;
  11. CVE-2022-22965: Spring MVC and Spring WebFlux (Spring4Shell vulnerability);
  12. CVE-2022-25075: TOTOLink A3000RU router;
  13. CVE-2022-26186: TOTOLink N600R router;
  14. CVE-2022-26210: TOTOLink A830R router;
  15. CVE-2022-30525: Zyxel USG Flex 100(瓦) Firewall;
  16. CVE-2022-34538: MEGApix IP cameras;
  17. CVE-2022-37061: FLIX AX8 thermal cameras.

另外, the botnet uses four more exploits for bugs that have not been assigned CVE identifiers. Two of these vulnerabilities are related to GPON terminals and D-Link routers. There are no details about the others yet.

After gaining a foothold on a compromised device, Zerobot contacts the command-and-control server and transmits basic information about the victim to its operators. C&C can respond with one of the following commands:

  1. pingkeep a connection;
  2. attacklaunch an attack for different protocols (TCP, UDP, TLS, HTTP, ICMP);
  3. stopstop the attack;
  4. updateinstall the update and restart Zerobot;
  5. enable_scanscan open ports and start spreading via exploits or SSH/Telnet brute force;
  6. disable_scanstop scanning;
  7. 命令execute a command (cmd on Windows and bash on Linux);
  8. killkill the bot.

The researchers also write that the malware has an anti-kill module, which is designed to prevent the completion or destruction of its process.

While Zerobot is focused on organizing DDoS attacks, 然而, the report notes that it can also be used as a vector for initial access to victim networks.

And the media recently wrote, 例如, that Law Enforcement Officers Eliminated the Russian Botnet RSOCKS.

關於作者

卡琳娜·威爾遜

隨著超過 10 多年在線和印刷媒體寫作經驗, 我是提供清晰且引人注目的文案的專家.

我曾為一家領先的 SEO 文案機構撰寫文章,也為一些英國最知名的品牌撰寫文章, 雜誌和報紙.

發表評論