Mirai Botnet Variant Exploits 4-Religion Router Vulnerability for DDoS Assaults

Jan 08, 2025Ravie LakshmananMalware / Vulnerability

A Mirai botnet variant has been discovered exploiting a newly disclosed safety flaw impacting 4-Religion industrial routers since early November 2024 with the objective of conducting distributed denial-of-service (DDoS) assaults.

The botnet maintains roughly 15,000 day by day lively IP addresses, with the infections primarily scattered throughout China, Iran, Russia, Turkey, and america.

Exploiting an arsenal of over 20 recognized safety vulnerabilities and weak Telnet credentials for preliminary entry, the malware is thought to have been lively since February 2024. The botnet has been dubbed “gayfemboy” in reference to the offensive time period current within the supply code.

QiAnXin XLab mentioned it noticed the malware leveraging a zero-day vulnerability in industrial routers manufactured by China-based 4-Religion to ship the artifacts as early as November 9, 2024.

Cybersecurity

The vulnerability in query is CVE-2024-12856 (CVSS rating: 7.2), which refers to an working system (OS) command injection bug affecting router fashions F3x24 and F3x36 by making the most of unchanged default credentials.

Late final month, VulnCheck advised The Hacker Information that the vulnerability has been exploited within the wild to drop reverse shells and a Mirai-like payload on compromised gadgets.

Among the different safety flaws exploited by the botnet to increase its attain and scale embody CVE-2013-3307, CVE-2013-7471, CVE-2014-8361, CVE-2016-20016, CVE-2017-17215, CVE-2017-5259, CVE-2020-25499, CVE-2020-9054, CVE-2021-35394, CVE-2023-26801, CVE-2024-8956, and CVE-2024-8957.

As soon as launched, the malware makes an attempt to cover malicious processes and implements a Mirai-based command format to scan for susceptible gadgets, replace itself, and launch DDoS assaults in opposition to targets of curiosity.

DDoS assaults leveraging the botnet have focused a whole bunch of various entities each day, with the exercise scaling a brand new peak in October and November 2024. The assaults, whereas lasting between 10 and 30 seconds, generate visitors round 100 Gbps.

The disclosure comes weeks after Juniper Networks warned that Session Sensible Router (SSR) merchandise with default passwords are being focused by malicious actors to drop the Mirai botnet malware. Akamai has additionally revealed Mirai malware infections that weaponize a distant code execution flaw in DigiEver DVRs.

Cybersecurity

“DDoS has become one of the most common and destructive forms of cyber attacks,” XLab researchers mentioned. “Its attack modes are diverse, attack paths are highly concealed, and it can employ continuously evolving strategies and techniques to conduct precise strikes against various industries and systems, posing a significant threat to enterprises, government organizations, and individual users.”

The event additionally comes as menace actors are leveraging prone and misconfigured PHP servers (e.g., CVE-2024-4577) to deploy a cryptocurrency miner known as PacketCrypt.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.

Recent articles

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

Jan 17, 2025Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...