Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The Quad7 botnet extends to target SOHO routers and VPN devices
Global Security

The Quad7 botnet extends to target SOHO routers and VPN devices

AdminBy AdminSeptember 11, 2024No Comments3 Mins Read
Quad7 Botnet
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 11, 2024Ravi LakshmananNetwork Security / Hacking

Quad7 botnet

The operators of the mysterious Quad7 botnet thrive by hacking several brands of SOHO routers and VPN devices using a combination of known and unknown security flaws.

According to a new report from French cybersecurity company Sekoia, devices from TP-LINK, Zyxel, Asus, Axentra, D-Link and NETGEAR are the targets.

“Quad7 botnet operators appear to be evolving their toolkit by introducing new backdoors and exploring new protocols to improve stealth and evade the tracking capabilities of their Operational Relay Blocks (ORBs),” researchers Felix Hame, Pierre-Antoine D. . , and Charles M. said.

Quad7, also called 7777, was publicly documented for the first time by independent researcher Gi7w0rm in October 2023, which highlights a cluster pattern of activities combining TP-Link routers and Dahua digital video recorders (DVRs) into a botnet.

Cyber ​​security

The botnet, which got its name from the fact that it opens TCP port 7777 on compromised devices, was spotted brute-forcing Microsoft 3665 and Azure instances.

“The botnet also appears to be infecting other systems such as MVPower, Zyxel NAS, and GitLab, albeit at a very low volume,” – VulnCheck’s Jacob Baines. noted earlier this January. “The botnet doesn’t just run a service on port 7777. It also runs a SOCKS5 server on port 11228.”

The following analyses Sekoia and Team Cymru discovered over the past few months that the botnet not only compromised TP-Link routers in Bulgaria, Russia, the US and Ukraine, but has since spread to ASUS routers that have TCP ports 63256 and 63260 open.

Quad7 botnet

Recent findings show that the botnet consists of three additional clusters –

  • xlogin (aka the 7777 botnet) is a botnet consisting of hacked TP-Link routers with TCP ports 7777 and 11288 open
  • alogin (aka botnet 63256) is a botnet consisting of jailbroken ASUS routers with TCP ports 63256 and 63260 open
  • rlogin is a botnet consisting of compromised Ruckus Wireless devices that have TCP port 63210 open
  • axlogin – botnet capable of targeting Axentra NAS devices (not yet detected in the wild)
  • zylogin is a botnet consisting of compromised Zyxel VPN devices that have TCP port 3256 open

Sekoia told The Hacker News that the countries with the most infections are Bulgaria (1,093), the United States (733) and Ukraine (697).

Cyber ​​security

Another sign of tactical evolution is that threat actors are now using a new backdoor called UPDTAE, which installs an HTTP-based back-shell to remotely control infected devices and execute commands sent from the Command and Control (C2) server.

At this time, it is unclear what the exact purpose of the botnet is or who is behind it, but the company said the activity is likely the handiwork of a Chinese state threat actor.

“Regarding 7777 (the botnet), we’ve only seen brute force attempts against Microsoft 365 accounts,” Emme told the publication. “As for other botnets, we still don’t know how they’re being used.”

“However, after discussions with other researchers and new discoveries, we are almost certain that the CN operators are more likely to be government-sponsored than simple cybercriminals (compromising business emails).”

“We see the threat actor trying to be more stealthy by using new malware on compromised edge devices. The main purpose of this step is to prevent the tracking of affiliated botnets.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.