Multiple Apple Products Vulnerabilities
December 26, 2024Enhancing Your Cybersecurity Posture by Outsourcing Your Security Operations Centre (SOC)
December 26, 2024Multiple Apple Products Vulnerabilities
December 26, 2024Enhancing Your Cybersecurity Posture by Outsourcing Your Security Operations Centre (SOC)
December 26, 2024Severity
High
Analysis Summary
An unpatched remote code execution vulnerability in DigiEver DS-2105 Pro NVRs that has not been assigned a tracker number is being actively exploited by a new Mirai-based botnet. Targeting many network video recorders and TP-Link routers with out-of-date firmware, the campaign began in October.
Researchers uncovered one of the flaws exploited in the campaign and presented it at the DefCamp security conference in Bucharest, Romania, last year. Multiple DVR devices are impacted by the problem, the researcher stated at the time. Researchers noticed that the botnet began taking advantage of the vulnerability in the middle of November, but they also discovered indications that the campaign had been running since at least September. The latest Mirai malware variant targets CVE-2018-17532 on Teltonika RUT9XX routers and CVE-2023-1389 on TP-Link devices in addition to the DigiEver vulnerability.
The '/cgi-bin/cgi_main.cgi' URI, which incorrectly validates user inputs, is the target of the remote code execution (RCE) vulnerability that was used to compromise DigiEver NVRs. Because of this, remote, unauthenticated attackers can use specific parameters, including the ntp field in HTTP POST requests, to inject commands like "curl" and "chmod." According to researchers, the attacks that this Mirai-based botnet has shown resemble the ones that the presentation outlines.
The attackers recruit the device into the malware's botnet by using command injection to retrieve the malware binary from an external server. Cron tasks are added for persistence. After the device has been infiltrated, exploit sets and credential lists are utilized to either spread to other devices or carry out distributed denial of service (DDoS) attacks. The new Mirai variant is noteworthy for targeting a wide variety of system architectures, such as x86, ARM, and MIPS, and for using XOR and ChaCha20 encryption.
While using sophisticated decryption techniques is not new, it does indicate that Mirai-based botnet operators are changing their strategies, methods, and practices. Since many Mirai-based botnets still rely on the original string obfuscation logic from recycled code that was part of the original Mirai malware source code release, this is very noteworthy.
Impact
- Code Execution
- Unauthorized Access
- Denial of Service
Indicators of Compromise
Domain Name
- hailcocks.ru
- kingstonwikkerink.dyn
- catvision.dyn
- shitrocket.dyn
- catlovingfools.geek
- hikvision.geek
MD5
- bb9275394716c60d1941432c7085ca13
- 2bc1855eb4297c28116e412b6705e14a
- 0c23d656841504f17958cf6df344ca4a
- d1ec2b1fec7a900c972723fd8a84e15e
- 718b8d27633b002976ab900127af09ad
- da3b2e781acf9fd712d0adb4f7d6f989
SHA-256
- 3c0eb5de2946c558159a6b6a656d463febee037c17a1f605330e601cfcd39615
- 0d8c3289a2b21abb0d414e2c730d46081e9334a97b5e0b52b9a2f248c59a59ad
- b32390e3ed03b99419c736b2eb707886b9966f731e629f23e3af63ea7a91a7af
- dec561cc19458ea127dc1f548fcd0aaa51db007fa8b95c353086cd2d26bfcf02
- a1b73a3fbd2e373a35d3745d563186b06857f594fa5379f6f7401d09476a0c41
- 31813bb69e10b636c785358ca09d7f91979454dc6fc001f750bf03ad8bde8fe5
SHA1
- 43f6e51ca69e70abb7d6cfd7f11f15df3fcc97cc
- 4d8189399c887b335e1d690961e38b806948d9cd
- e76fbda19460ef4872354e4e5d7f9b827719463c
- 17ef5b29eeb3a35057a6095520e4c7c02cd247f3
- 1a98f6da913841951a46311ac474c57ef3f95ea0
- 3472c3ffa4b2049110a8de71a416d8d5235ee6a0
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Regularly update firmware on all network devices, especially those identified as vulnerable.
- Implement strict access controls to limit the exposure of network device interfaces on the internet.
- Use advanced DDoS mitigation services and solutions that can handle high packet and bit rate attacks.
- Conduct frequent security audits and vulnerability assessments on network infrastructure.
- Employ network segmentation to isolate critical infrastructure and reduce the attack surface.
- Increase monitoring and detection capabilities to quickly identify and respond to unusual traffic patterns.
- Collaborate with device manufacturers to address and patch security vulnerabilities promptly.
- Educate and inform users and administrators about the importance of timely updates and secure configurations.
- Implement robust firewall and intrusion prevention systems to filter malicious traffic.
- Develop and maintain an incident response plan to handle DDoS attacks effectively and minimize downtime.