Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » An unpatched AVTECH IP camera flaw used by hackers for botnet attacks
Global Security

An unpatched AVTECH IP camera flaw used by hackers for botnet attacks

AdminBy AdminAugust 29, 2024No Comments3 Mins Read
Botnet Attacks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 29, 2024Ravi LakshmananIoT Security / Vulnerability

Botnet attacks

A multi-year high-severity flaw affecting AVTECH IP cameras has been weaponized by attackers as a zero-day tool to tie them into botnets.

CVE-2024-7029 (CVSS Score: 8.7), the vulnerability in question is “a remote code execution (RCE) command injection vulnerability discovered in the brightness feature of AVTECH CCTV cameras.” , Akamai researchers Kyle Lefton, Larry Cashdollar and Aline Eliovich said.

Details of the security flaw were first published earlier this month by the US Cybersecurity and Infrastructure Security Agency (CISA), highlighting its low attack complexity and remote exploitability.

“Successful exploitation of this vulnerability could allow an attacker to enter and execute commands as the owner of a running process,” the agency notes. noted in a notice published on August 1, 2024.

Cyber ​​security

It should be noted that the problem remains unsolved. It affects AVM1203 camera devices using firmware versions up to and including FullImg-1023-1007-1011-1009. The devices, although discontinued, are still used in commercial establishments, financial services, healthcare and public health, transportation systems under CISA.

Akamai said the attack campaign has been ongoing since March 2024, although the vulnerability had public proof of concept (PoC). back in February 2019. However, the CVE ID was only released this month.

“The attackers running these botnets have used new or hidden vulnerabilities to spread malware,” the web infrastructure company said. “There are many vulnerabilities with public exploits or available PoCs that do not have an official CVE designation, and in some cases devices remain unpatched.”

The attack chains are quite simple because they use the AVTECH IP camera along with other known vulnerabilities (CVE-2014-8361 and CVE-2017-17215), spread a The Mirai botnet variant on target systems.

“In this case, the botnet is likely using the referenced Corona Mirai variant other suppliers already in 2020 for the COVID-19 virus,” the researchers said. “Once executed, the malware connects to a large number of hosts via Telnet on ports 23, 2323, and 37215. It also prints the string ‘Corona’ to the console on the infected host.” .

The development comes weeks after cybersecurity firms Sekoia and Team Cymru detailed a “mysterious” botnet called 7777 (or Quad7) that uses compromised TP-Link and ASUS routers to launch password spraying attacks on Microsoft accounts 365. As of August 5, 2024, 12,783 active bots were detected.

Cyber ​​security

“This botnet is known in open source to deploy SOCKS5 proxies on compromised devices to transmit very slow ‘brute force’ attacks against Microsoft 365 accounts of many organizations around the world,” Sekoia researchers saidnoting that most of the infected routers are located in Bulgaria, Russia, USA and Ukraine.

While the botnet got its name from the fact that it opens up TCP port 7777 on compromised devices, further investigation by Team Cymru has since revealed a possible expansion to include a second set of bots consisting mainly of routers ASUS and are characterized by open port 63256.

“The Quad7 botnet continues to pose a significant threat, demonstrating both resilience and adaptability, even if its potential is currently unknown or unreachable.” Team Cymru said. “The connection between the 7777 and 63256 botnets, while maintaining what appears to be a clear operational bunker, further highlights the evolving tactics of the threat operators behind Quad7.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.