Cobalt Strike Malware – Active IOCs
February 10, 2025ICS: Delta Electronics CNCSoft-G2 Vulnerability
February 10, 2025Cobalt Strike Malware – Active IOCs
February 10, 2025ICS: Delta Electronics CNCSoft-G2 Vulnerability
February 10, 2025Severity
High
Analysis Summary
The Mirai botnet is a type of malware that infects Internet of Things (IoT) devices, such as routers, security cameras, and other smart devices, to launch distributed denial-of-service (DDoS) attacks. The botnet was first discovered in August 2016 and quickly gained notoriety for its ability to launch some of the largest DDoS attacks ever recorded, including an attack that took down the DNS provider Dyn.
Mirai works by scanning the internet for devices that use default or easily guessable passwords, such as "admin" or "password". Once a vulnerable device is identified, the malware infects it and adds it to the botnet, which can then be used to launch DDoS attacks on a target.
Mirai is particularly effective because it can exploit the large number of poorly secured IoT devices that are connected to the internet. This makes it difficult to defend against, as many of these devices have limited processing power and memory, and may not receive regular security updates.
Since its discovery, Mirai has continued to evolve and new variants of the malware have been detected. The best defense against Mirai is to ensure that IoT devices are properly secured, with strong passwords and regular security updates. Network administrators can also use tools to monitor for unusual traffic patterns that may indicate a DDoS attack is underway.
Impact
- Server Outage
- Data Loss
- Website Downtime
Indicators of Compromise
MD5
834d2a4191d8a23b349c4f0a57b11a84
8441ab292bee2fccf72b3df7c1bb96d3
d84fb936bdbc0ede49ae75c9e879e9f8
1996f341bdd8f3db0905582bb73c429f
760d19d658ce470bb8039228ee62572c
SHA-256
ab4f1dd1dd2c6f3c899e2be0fb2a48e4db71afada1784db2c2ce3fa798557dd3
2199b5492ac7205f50e669ce04bd526446c2c0971347cacecf1bc7cae7723a07
138c84202b04d4f5bfabed26b0648c4acff16ef8a84f96affd2e8d4d36058bc6
afb7beab2a47ee6f18a2cf82261ec9b45b498dcdd8209470b1a357ac87b07a79
8dbffd1feeb71e15c5f9966aa2aea6e42744a6874e314b017f8cae0c90dc0639
SHA1
3df41a5c6dd6ea646ef37899e037481dcfeb70d6
0064aad10e18e6c0c252c784e8f43da8c52ef02a
32100023b81594a3b0ebab590f18a0e35fa43b3f
a49f7c5177913dab1e86ca096f2c655167717d81
6266ad0cc6724fd95a73feb80602e6c9458c02e4
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Upgrade your operating system.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Immediately change default passwords on IoT devices to unique ones.
- Keep devices' firmware and software up to date to ensure that known vulnerabilities are patched.
- Implement firewalls and intrusion detection systems to monitor and control traffic to and from IoT devices.
- Employ tools that can identify unusual behavior or traffic patterns that might indicate a DDoS attack or a compromised device.
- Disable any unnecessary services or features on IoT devices to reduce their attack surface.
- Follow security best practices, such as disabling remote management if not needed and enabling security features provided by the device manufacturer.
- Deploy intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous or malicious network activity.
- Set up alerts for unusual traffic patterns that might indicate a DDoS attack or a compromised device.