Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Qilin Ransomware adds the “Call Lawyer” function to pressure victims for big ransom

June 20, 2025

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » FICORA and Kaiten botnets use old D-Link vulnerabilities for global attacks
Global Security

FICORA and Kaiten botnets use old D-Link vulnerabilities for global attacks

AdminBy AdminDecember 27, 2024No Comments4 Mins Read
FICORA and Kaiten Botnets
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 27, 2024Ravi LakshmananBotnet / DDoS attack

FICORA and Kaiten botnets

Cybersecurity researchers are warning of a surge in malicious activity involving vulnerable D-Link routers in two different botnets, Mirai variant named FICORA and a Kaiten (aka Tsunami) variant called CAPSAICIN.

“These botnets are often propagated through documented D-Link vulnerabilities that allow remote attackers to execute malicious commands via the GetDeviceSettings action in the HNAP (Home Network Administration Protocol) interface,” Vincent Lee, researcher at Fortinet FortiGuard Labs. said in Thursday’s analysis.

“This HNAP flaw was first discovered nearly a decade ago when numerous devices were affected by various CVE numbers, including CVE-2015-2051, CVE-2019-10891, CVE-2022-37056and CVE-2024-33112.”

Cyber ​​security

According to the cyber security company’s telemetry data, attacks involving FICORA have targeted various countries around the world, while attacks involving CAPSAICIN have primarily singled out East Asian territories such as Japan and Taiwan. CAPSAICIN activity is said to have been “intense” only between October 21 and 22, 2024.

FICORA botnet attacks deploy a bootloader shell script (“multi”) from a remote server (“103.149.87(.)69”), which then proceeds to download the main payload for different Linux architectures separately using wget, ftpget , curl and tftp command.

Inside the botnet malware is a brute-force attack feature that contains a hard-coded list of usernames and passwords. The Mirai derivative also contains features for conducting distributed denial of service (DDoS) attacks using UDP, TCP, and DNS protocols.

The bootloader script (“bins.sh”) for CAPSAICIN uses a different IP address (“87.10.220(.)221”) and follows the same approach to obtain the botnet for different Linux architectures to ensure maximum compatibility.

“The malware kills known botnet processes to ensure that it is the only botnet running on the victim host,” Lee said. “CAPSAICIN” establishes a connection socket to its C2 server “192.110.247(.)46” and sends information about the affected host’s OS and the nickname given by the malware back to the C2 server.

FICORA and Kaiten botnets

CAPSAICIN then waits to execute further commands on the compromised devices, including “PRIVMSG”, a command that can be used to perform various malicious operations such as:

  • GETIP – Get the IP address from the interface
  • CLEARHISTORY – Delete command history
  • FASTFLUX – Run a proxy to a port on a different IP to the interface
  • RNDNICK is the victim’s random host nick
  • NICK – Change host victim’s nickname
  • SERVER – Change command and control server
  • ENABLE – Enable the bot
  • KILL – Kill the session
  • GET – download file
  • VERSION – Queries the version of the victim host
  • IRC – forward message to server
  • SH – Execute shell commands
  • ISH – Interact with the shell of the victim’s host
  • SHD – Execute shell command and ignore signals
  • INSTALL – Download and install the binary to “/var/bin”
  • BASH – Execute commands using bash
  • BINUPDATE – Update binary to “/var/bin” via get
  • BLOCK – Close the Telnet backdoor and run the malware instead
  • HELP – Displays help information about malware
  • STD – Flood attack with random hardcoded strings for port number and target specified by attacker
  • UNKNOWN – UDP flood attack with random characters for the port number and target specified by the attacker
  • HTTP – HTTP flood attack.
  • HOLD – A TCP connection attack.
  • JUNK is a TCP flood attack.
  • BLACK SISTER – BlackNurse attackwhich is based on an ICMP flooding packet attack
  • DNS – DNS extension attack
  • KILLALL – Stop all DDoS attacks
  • KILLMYEYEPEEUSINGHOIC – Kill the original malware

“Even though the flaws used in this attack were discovered and fixed nearly a decade ago, these attacks remain constantly active around the world,” Lee said. “It is critical for every enterprise to regularly update the core of their devices and maintain comprehensive monitoring.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Qilin Ransomware adds the “Call Lawyer” function to pressure victims for big ransom

June 20, 2025

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Qilin Ransomware adds the “Call Lawyer” function to pressure victims for big ransom

June 20, 2025

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Qilin Ransomware adds the “Call Lawyer” function to pressure victims for big ransom

June 20, 2025

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.