Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Ballista Botnet exploits an unprocessed vulnerability TP-Link, infects more than 6000 devices
Global Security

Ballista Botnet exploits an unprocessed vulnerability TP-Link, infects more than 6000 devices

AdminBy AdminMarch 11, 2025No Comments3 Mins Read
Ballista Botnet
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 11, 2025Red LakshmananNetwork security / vulnerability

Ballista Botnet

According to the new results of the Cto Ctrl team, which were inflicted on non-professional TP-Link Larher routers, the new Botnet company, dubbed Ballista.

“BotNet uses the Vulnerability of the Remote Code (RCE) in the TP-Link Archer routers (CVE-2013-1389) to automatically distribute on the Internet,” said the security researchers and Mattlman in technical technical technical report Share with Hacker News.

Cve-2013-1389 This is a high-speed security disadvantage affecting the TP-Link Archer Ax-21 routers that can lead to team introduction, which can then pave the way for remote code.

A the earliest evidence Active exploitation of the shortage is dated April 2023, and unidentified threat subjects use it to refuse malicious Mirai software. Since then, it has also been abused by the distribution of other malware programs as Convoy and Androxgh0st.

Cybersecurity

Cato Ctrl said she had discovered a ballroom company on January 10, 2025. The latest exploitation attempt was recorded on February 17.

The attack sequence entails the use of malicious programs, the shell script (“Dropb.sh”) designed to obtain and perform the main binary system for various system architectures such as MIPS, MIPSEL, ARMV5L, ARMV7L and X86_64.

After performing the malicious software sets the encrypted team and control (C2) at Port 82 to take control of the device.

“This allows you to execute Shell teams further and refusing service (DOS),” the researchers said. “In addition, malicious software is trying to read sensitive files in the local system.”

Ballista Botnet

Some of the supported commands are below –

  • A flood that causes a flood attack
  • Operating which exploits CVE-2013-1389
  • Start an optional parameter used with an explicit to run the module
  • Close which stops the module run function
  • Shell that manages the Linux Shell team on the local system.
  • Killal used to stop the service

In addition, he is able to stop the previous cases of himself and erase his own presence as soon as the performance begins. It is also intended to distribute other routers trying to use the disadvantage.

Cybersecurity

Using the location of the IP -Drace C2 (2.237.57 (.) 70) and the presence of Italian linguistic lines in binary files malicious programs involve the involvement of an unknown Italian actor, the cybersecurity campaign said.

Given this, it seems that malicious software seems to be actively developing, given that the IP address is no longer functional, and there is a new variant of the dropper that uses the TOR network domains rather than on a solid IP address.

Search on the surface control platform shows what shows that More than 6000 devices infected with boly. Infections are concentrated around Brazil, Poland, the United Kingdom, Bulgaria and Turkey.

Botnet has been found to focus on production, medical/medical, services and technological organizations in the US, Australia, China and Mexico.

“While this sample of malware shares the similarity to other botnets, it remains different from the widely used botnets such as Mirai and Mozi,” the researchers said.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.