Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Lack of shortage of camera Edimax used for Mirai Botnet attacks since last year
Global Security

Lack of shortage of camera Edimax used for Mirai Botnet attacks since last year

AdminBy AdminMarch 17, 2025No Comments3 Mins Read
Mirai Botnet Attacks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 17, 2025Red LakshmananBotnet / vulnerability

Mirai Botnet attacks

UNLOOned Security Lack of Safety, which affects the Edimax IC-7100 network camera Options for malicious Mirat Botnet programs Since at least May 2024.

Vulnerability in question Cve-2015-1316 (CVSS V4 Evaluation: 9.3), a critical operating system of a team injection that the attacker can use to achieve a remote code on sensitive devices with a specially designed request.

Akamai Web Infrastructure and Security Company said the earliest attempt to operate for the shortage of May 2024, although there was an exploitation proof of the concept (POC) Publicly available Since June 2023.

Cybersecurity

“The expluent is directed to /camera-cgi/admin/param.cgi final point in Edimax devices and introduces commands into the NTP_SERVERNAME option as part of the IPCamSource Param.cgi” – Note.

In armed weapons, the final point requires authentication, it has been found that the attempts to operate use default accounting (administrator: 1234) to obtain unauthorized access.

At least two different Mirai botten options have been defined as the use of vulnerability, one of them also includes the functionality of the anti-introduction before launching a shell, which receives malicious software for different architectures.

The ultimate goal of these companies is the plant -based plant that can arrange widespread attacks from service (DDOS) on targets that are interested in TCP and UDP protocols.

Mirai Botnet attacks

In addition, the botnets used by the CVE-2024-7214 were noted, affecting the Iot Totolink devices, and the CVE-2021-36220, and the Hadoop Yarn vulnerability.

In an independent counseling published last week, Edimax – Note The CVE-2025-1316 affects the outdated devices that are no longer supported and that it does not plan to provide a safety patch since the model was stopped more than 10 years ago.

Cybersecurity

Given the lack of official patch, users are advised either to move to a newer model, or to avoid exposing the device directly over the Internet, change the default administrator password and control the access logs to any signs of unusual activity.

“One of the most effective ways to start cybercriminals to collect botten is to aim a poorly secured and outdated firmware on old devices,” Akamai said.

“The legacy of Mirai continues to hear organizations around the world, since the spread of mirai -based sweatshirts does not show signs of stopping. With all available textbooks and source (and, now, with the help of AI), scrolling Botta is even easier.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.