Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices
Global Security

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

AdminBy AdminMay 23, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 23, 2025Red LakshmananIntelligence threats / network security

Cybersecurity researchers revealed that the actor of the CodenaMent Vicvertrap has compromised almost 5,300 unique networking devices in 84 countries and turned them into a Honeypot network.

The actor threatens is observed using a critical lack of security that affects the Mater Bustion RV016, RV042, RV042G, RV082, RV320 and RV325 (CVE-2023-20118) to translate them into the Honeypots En Mass. Most infections are located in Macau, with 850 compromised devices.

“The infection network includes the execution of the shell script, dubbed Netghost, which redirects incoming traffic from certain ports compromised router in infrastructure similar to Honeypot – Note in an analysis published on Thursday.

Cybersecurity

It is worth noting that the operation of CVE-2013-20118 was previously attributed to the French cybersecurity company of another botnet, called Polariz.

Although there is no evidence that these two sets of activity are connected, it is believed that the actor standing for Viciodtrap is likely to adjust the Honeypot infrastructure, breaking a wide range of online equipment, including SOHO, SSL VPNS, DVRS and BMC controllers with more than 50 brands, Araknis Nevers. ASUS, DS-LINK, LINKSYS.

“This installation will allow the actor to observe the attempts in several environments and potentially collect non-public or zero feats, as well as re-use of access obtained by other subjects,” he added.

The attack network entails weapons Cve-2023-20118 to download and execute Bash through FTPGE, which then turns to the external server to get WGET Binary. In the next step, Cisco’s lack is operated for the second time, using it to perform the second scenario obtained using the previously dropped WGET.

The script scenario of the second stage, which is internally called Netghost, is set up for redirecting network traffic from a broken system to a third -person infrastructure controlled by the attacker, thereby facilitating the enemy’s attacks on average (AITM). It also comes with the ability to remove itself from the broken host to minimize the medical examination.

SEKOIA noted that all attempts to exploit from one IP -Dar (“101.99.91 (.) 151”), with the earliest activity dating in March 2025.

Cybersecurity

“This assumption coincides with the use of the Netghost attacker,” said security researchers Felix Eima and Jeremy Tion. “The redirect mechanism effectively places an attacker as a silent observer, capable of collecting attempts to operate and possibly access to the web transit.”

As recently this month, exploitation efforts are also aimed at ASUS routers, but from another IP -Odars (“101.99.91 (.) 239”), although it was not revealed that the threat subjects create a single Honeypot on infected devices. All IP -Designs used in the company are located in Malaysia and are included in the autonomous system (AS45839), which is managed by the Shinjiru hosting provider.

The actor is believed to be a Chinese origin based on a weak overlapping with the gas infrastructure and the fact that the movement is redirected to numerous assets in Taiwan and the United States.

“The ultimate goal of Vicvertrap remains even incomprehensible (though) with high confidence that this is a Honeypot style net,” Socai summarized.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025

CISA warns of suspicion of extensive Saas attacks that exploit app secrets and incorrect cloud settings

May 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025

CISA warns of suspicion of extensive Saas attacks that exploit app secrets and incorrect cloud settings

May 23, 2025

Chinese hackers operate the shortage of CityWorks Trimble to penetrate the US public networks

May 22, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.