UPDATED 09:00 EST / JANUARY 21 2025

SECURITY

New Mirai variant ‘Murdoc_Botnet’ targets AVTECH cameras and Huawei routers

Researchers at cybersecurity software provider Qualys Inc. are warning of a new Mirai botnet variant that’s being used to target vulnerabilities in AVTECH Cameras and Huawei HG523 routers.

The variant, dubbed “Murdoc_Botnet,” was first detected in July and has already been found to have affected at least 1,300 devices globally, especially in Malaysia, Thailand, Mexico and Indonesia. Like all Mirai variants, the idea is to infect as many devices as possible to create new, extensive botnet networks.

The Qualys researchers found that Murdoc_Botnet employs a combination of ELF files and shell scripts to infiltrate devices. The scripts exploit vulnerabilities, such as CVE-2024-7029 and CVE-2017-17215, to deploy malware payloads and establish persistent connections with command-and-control servers.

The campaign’s infrastructure includes over 100 distinct command and control servers, with each responsible for managing and propagating malware to compromised devices. The servers communicate with infected devices to orchestrate activities such as payload execution, further infection and botnet expansion.

The Murdoc_Botnet favors internet of things devices, particularly targeting AVTECH cameras and Huawei routers. It targets those devices, knowing that they have existing vulnerabilities that are unlikely to be patched, ensuring a steady stream of new victims to enhance its network.

The malware spreads by executing bash scripts that fetch and execute payloads. The scripts are also designed to remove traces of their activity post-execution, making it harder for security tools to detect and mitigate the threat.

The Qualys researchers recommend that enterprise users and administrators make efforts to identify and protect against such attacks.

Recommended action includes regularly monitoring for suspicious processes, events and network traffic spawned by the execution of any untrusted binaries and scripts. Administrators and users should always be cautious in executing shell scripts from unknown or untrusted sources and admins should keep systems and firmware updated with the latest releases and patches.

Image: SiliconANGLE/Ideogram

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU