26 C
Jaipur
Friday, October 23, 2020

Mirai Variant Using 13 Different Exploits to Hack Routers

Must read

Acer Chromebook: Acer launches Chromebook Spin 513 and Halo smart speaker

Acer has launched its first Chromebook powered by the Qualcomm Snapdragon 7c compute platform – the Acer Chromebook Spin 513...

Huawei Mate 40: Huawei unveils the Mate 40 Pro and Pro+ smartphones

Huawei has bolstered its product line-up with the Mate 40 Series flagship smartphones--the Mate 40 Pro and the Mate 40 Pro+....

Flipkart: Flipkart, Reliance Jio deals push VC inflows to $3.6 billion in September quarter : Report – Latest News

Despite the pandemic-driven recession, venture capitalists continued to invest dollars into the country with September quarter seeing investment inflows more than doubling to USD...

google: Google has undermined competition, says South Korean antitrust chief – Latest News

South Korea's antitrust chief said on Thursday the agency believes US search engine giant Google has undermined competition, adding that the agency plans to...

Researchers discovered a new wave of Mirai Variant that used 13 different exploits to attack various router models and other network devices.

These exploits are associated with this new Mirai variant capable of launching backdoor and distributed denial-of-service (DDoS) attacks.

Mirai malware has strong records of infecting poorly managing IoT devices and performing DDOS attacks on various platforms.

Mirai targets several different routers including D-Link, Linksys, GPON, Netgear, Huawei and other network devices such as ThinkPHP, multiple CCTV-DVR vendors, UPnP, MVPower digital video recorders, and Vacron network video recorder.

This is the first time to have used all 13 exploits together in a single campaign including some of the exploits that used in the previous attack.

Initially, the new variant of Mirai found in the honeypot system that deployed by Trend Micro and it looking for the IoT devices to exploit several vulnerabilities that include remote code execution (RCE), authentication bypass and command injection.

According to Trend Micro ” It showed that this malware used different means of spreading, and also revealed its use of three XOR keys to encrypt data. Decrypting the malware’s strings using XOR revealed one of the first relevant indicators of the malware’s being a Mirai variant.”

Mirai variant Exploits

Researchers found different URL’s that is associated with Mirai variant including the command-and-control (C&C) link and download and dropper links.

New Mirai variant code reveals more information about infection process, especially, first 3 exploits scanning the specific vulnerabilities in ThinkPHP, certain Huawei,Linksys routers and also a scanner for other 10 vulnerabilities used in this attack.

It also performs a Brute force attack using capabilities using several common credentials.

Mirai Variant associated exploits taking advantage of the different vulnerabilities that found in the routers, surveillance products, and other devices

Among all 13 vulnerabilities, 11 had been already used in the previous Mirai variant campaign in 2018 and other 2 exploits are completely new that can be used against Linksys and ThinkPHP RCEs.

The attacker behind this new variant could have simply copied the code from other attacks, and with it the exploits these previous cases had used.

Users are recommended to change the default credentials in the router to prevent the credential based attacks.

Indicators of Compromise (IoCs)

Related SHA-256 hash detected as Backdoor.Linux.MIRAI.VWIPT:

c15382bc81e1bff4cf03d769275b7c4d2d586a21e81ad4138464d808e3bb464c

Related malicious URLs:

C&C : hxxp://32[.]235[.]102[.]123:1337

Download Link and Droppers

hxxp://ililililililililil[.]hopto[.]org/shiina/tmp.arm7
hxxp://ililililililililil[.]hopto[.]org/shiina/tmp.mips
hxxp://ililililililililil[.]hopto[.]org/love.sh

Used credentials:

12345
666666
888888
20080826
/ADMIN/
1q2w3e4r5
3ep5w2u
admintelecom
anko
cisco
default
e8ehome
e8telnet
guest
hi3518
hi3518
hunt5759
[email protected]
ipcam_rt5350
juantech
juantech
jvbzd
jvbzd
klv123
klv1234
klv1234
password
qwerty
QwestM0dem
service
service
smcadmin
supervisor
support
svgodie
system
telecomadmin
ubnt
xc3511
xmhdipc
xmhdpic
zsun1188
Zte521

Download Free E-book to learn about complete Enterprise Security Implementation & Mitigation Steps – Download Free-Ebook Here.

Source link

- Advertisement -

More articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest article

Acer Chromebook: Acer launches Chromebook Spin 513 and Halo smart speaker

Acer has launched its first Chromebook powered by the Qualcomm Snapdragon 7c compute platform – the Acer Chromebook Spin 513...

Huawei Mate 40: Huawei unveils the Mate 40 Pro and Pro+ smartphones

Huawei has bolstered its product line-up with the Mate 40 Series flagship smartphones--the Mate 40 Pro and the Mate 40 Pro+....

Flipkart: Flipkart, Reliance Jio deals push VC inflows to $3.6 billion in September quarter : Report – Latest News

Despite the pandemic-driven recession, venture capitalists continued to invest dollars into the country with September quarter seeing investment inflows more than doubling to USD...

google: Google has undermined competition, says South Korean antitrust chief – Latest News

South Korea's antitrust chief said on Thursday the agency believes US search engine giant Google has undermined competition, adding that the agency plans to...

apple: Apple expands Express retail store format ahead of holiday season – Latest News

Apple is expanding a new physical store format as it tries to get iPhone 12 models into customers' hands, its retail chief told Reuters...