22 C
Jaipur
Saturday, October 31, 2020

Hackers Bypass Symantec Web Gateway Using Mirai & Hoaxcalls Botnets

Must read

This $299 laptop is one of the best Black Friday deals we’ve seen yet – but it ends tomorrow

Granted, we're only just getting started in this year's Black Friday laptop deals, but Best Buy's offerings this weekend are looking particularly sharp. One...

Can the Honor Watch ES smartwatch give a lazy person a six-pack? I found out

Many smartwatches come with a wide range of fitness modes, helping the wearer stay fit and active; however, for all the clever tech in...

This is how online shopping may ‘look like’ this holiday season, as per Adobe

Adobe has released its online shopping predictions for the 2020 holiday season. Based on Adobe Analytics data, the company analyzed over one trillion...

Advanced Copy – Add Progress Bar To cp And mv Commands In Linux

The GNU cp and GNU mv tools are used to copy and move files and directories in GNU/Linux operating system. One missing feature in these two utilities is...

A new Mirai and Hoaxcalls botnet campaign which is attacking post-authentication class of the Symantec Secure Web Gateway Remote code execution vulnerability.

Mirai is one of the well-known IoT Malware that targets IoT devices such as IP cameras and DVRs to take control of those devices by taking advantage of open ports and default credentials, exploiting disclosed and non-disclosed vulnerabilities, and add them in botnet network.

Mirai malware has a strong background of infecting devices and has been used in most disruptive DDoS attacks on various platforms but in this campaign, it is utilizing credential brute force and exploitation of the Symantec Secure Web Gateway RCE vulnerability.

Hoaxcalls is an IoT variant of Tsunami and Gafgyt Botnets Family. It was first detected in April 2020.

This malware has the ability to proxy traffic, launch a large number of DDoS attacks. download updates, prevent reboots, and maintain continuous across device restarts.

Hoaxcalls Examination :

Samples of the same botnet include an exploit targeting the End-Of-Life Symantec Secure Web Gateway v5.0.2.8 with an HTTP request in the format:

HTTP Request Format

As seen in the above snapshot, some samples reach out to a URL for a public file upload service (plexle[.]us) where the post-exploitation payload is hosted.

The URL contacted for the update serves a shell script that downloads and executes binaries from attacker-controlled URLs.

Update URL Snapshot

According to the Palo Alto networks research, Palo Alto Networks customers are secured from this attack. Threat Prevention blocks all exploits and Wild Fire recognizes all related samples with suspicious findings.

As per Symantec Research team , they don’t have any proof that any other firmware versions are vulnerable as of now.

They also committed that there is no exploited vulnerability present in Symantec Secure Web Gateway 5.0.2.8 and the authentication is required for the successful exploitation of the Symantec Secure Web Gateway RCE.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Source link

- Advertisement -

More articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest article

This $299 laptop is one of the best Black Friday deals we’ve seen yet – but it ends tomorrow

Granted, we're only just getting started in this year's Black Friday laptop deals, but Best Buy's offerings this weekend are looking particularly sharp. One...

Can the Honor Watch ES smartwatch give a lazy person a six-pack? I found out

Many smartwatches come with a wide range of fitness modes, helping the wearer stay fit and active; however, for all the clever tech in...

This is how online shopping may ‘look like’ this holiday season, as per Adobe

Adobe has released its online shopping predictions for the 2020 holiday season. Based on Adobe Analytics data, the company analyzed over one trillion...

Advanced Copy – Add Progress Bar To cp And mv Commands In Linux

The GNU cp and GNU mv tools are used to copy and move files and directories in GNU/Linux operating system. One missing feature in these two utilities is...

Google has a Chrome zero-day warning for Windows users

Google has revealed a zero-day vulnerability affecting Windows 7,8 and 10 users which Microsoft is yet to fix. Microsoft is expected...