Cybersecurity Alert: Murdoc Botnet Campaign Targets IoT Devices Globally

Cybersecurity researchers have raised alarms about a large-scale campaign exploiting vulnerabilities in AVTECH IP cameras and Huawei HG532 routers. This campaign has been linked to a Mirai botnet variant known as the Murdoc Botnet. According to Shilpesh Trivedi, a security researcher at Qualys, the ongoing activity demonstrates advanced capabilities, targeting security flaws to compromise devices and establish expansive botnet networks.

Campaign Overview

The Murdoc Botnet campaign has been active since at least July 2024, with over 1,370 systems infected so far. A significant number of these infections have been identified in Malaysia, Mexico, Thailand, Indonesia, and Vietnam. The attackers leverage known vulnerabilities, including CVE-2017-17215 and CVE-2024-7029, to gain initial access to Internet of Things (IoT) devices. Once access is gained, a shell script is deployed to download and execute the botnet malware, tailored to the specific CPU architecture of the device.

The primary objective of these attacks is to weaponize the botnet for distributed denial-of-service (DDoS) attacks, which can cripple targeted networks and systems.

Exposure and Impact

A search on the Censys exposure management platform revealed that more than 37,995 AVTECH cameras are currently exposed online. These devices are predominantly located in Taiwan, Vietnam, Indonesia, the United States, and Sri Lanka.

The Murdoc Botnet campaign follows a series of similar incidents involving Mirai botnet variants. For instance:

  1. gayfemboy Botnet: Exploited a newly disclosed vulnerability in Four-Faith industrial routers in November 2024.
  2. CVE-2024-7029 Exploitation: Malicious actors enlisted AVTECH devices into a botnet in mid-2024.
  3. Japanese DDoS Attacks: Major corporations and banks in Japan faced large-scale DDoS attacks by the end of 2024. Targets also included organizations in the U.S., Bahrain, Poland, Spain, Israel, and Russia.

Botnet Operations

The DDoS attacks primarily target sectors such as telecommunications, technology, hosting, cloud computing, banking, gaming, and financial services. Currently, over 55% of compromised devices are located in India, followed by South Africa, Brazil, Bangladesh, and Kenya.

The Murdoc Botnet comprises malware variants derived from Mirai and BASHLITE. These malware strains are capable of executing multiple DDoS attack methods, updating malware, and enabling proxy services. The attacks typically involve infiltrating IoT devices, deploying a loader malware to fetch the main payload, and connecting to a command-and-control (C2) server for further instructions.

Recommendations for Protection

To mitigate the risks posed by the Murdoc Botnet and similar campaigns, cybersecurity experts recommend the following measures:

  1. Monitor Activity: Regularly monitor for suspicious processes, events, and network traffic generated by untrusted binaries or scripts.
  2. Apply Firmware Updates: Ensure all IoT devices run the latest firmware versions to patch known vulnerabilities.
  3. Secure Credentials: Change default usernames and passwords to strong, unique combinations.
  4. Network Segmentation: Isolate IoT devices from critical infrastructure to limit lateral movement in the event of compromise.
  5. Deploy Security Solutions: Utilize intrusion detection and prevention systems to identify and block malicious activity.

Conclusion

The Murdoc Botnet campaign underscores the persistent threat posed by IoT vulnerabilities. With attackers continuously evolving their tactics, organizations and individuals must remain vigilant, adopting robust security practices to safeguard their devices and networks. Failure to do so could result in severe disruptions, particularly for industries reliant on IoT technology.


Similar Articles
Image Description
Vulnerability RomCom Group Leveraging Microsoft Office Zero-Day Vulnerability to Spread Ransomware

A zero-day vulnerability refers to a software flaw that is unknown to the software vendor and for which no official patch or fix exists at th ...

  • By DragonX Team

  • Updated Sep 09, 2024

Cybersecurity researchers have raised alarms about a large-scale campaign exploiting vulnerabilities in AVTECH IP cameras and Huawei HG532 routers. This campaign has been linked to a Mirai botnet variant known as the Murdoc Botnet. According to Shilpesh Trivedi, a security researcher at Qualys, the ongoing activity demonstrates advanced capabilities, targeting security flaws to compromise devices and establish expansive botnet networks.

Campaign Overview

The Murdoc Botnet campaign has been active since at least July 2024, with over 1,370 systems infected so far. A significant number of these infections have been identified in Malaysia, Mexico, Thailand, Indonesia, and Vietnam. The attackers leverage known vulnerabilities, including CVE-2017-17215 and CVE-2024-7029, to gain initial access to Internet of Things (IoT) devices. Once access is gained, a shell script is deployed to download and execute the botnet malware, tailored to the specific CPU architecture of the device.

The primary objective of these attacks is to weaponize the botnet for distributed denial-of-service (DDoS) attacks, which can cripple targeted networks and systems.

Exposure and Impact

A search on the Censys exposure management platform revealed that more than 37,995 AVTECH cameras are currently exposed online. These devices are predominantly located in Taiwan, Vietnam, Indonesia, the United States, and Sri Lanka.

The Murdoc Botnet campaign follows a series of similar incidents involving Mirai botnet variants. For instance:

  1. gayfemboy Botnet: Exploited a newly disclosed vulnerability in Four-Faith industrial routers in November 2024.
  2. CVE-2024-7029 Exploitation: Malicious actors enlisted AVTECH devices into a botnet in mid-2024.
  3. Japanese DDoS Attacks: Major corporations and banks in Japan faced large-scale DDoS attacks by the end of 2024. Targets also included organizations in the U.S., Bahrain, Poland, Spain, Israel, and Russia.

Botnet Operations

The DDoS attacks primarily target sectors such as telecommunications, technology, hosting, cloud computing, banking, gaming, and financial services. Currently, over 55% of compromised devices are located in India, followed by South Africa, Brazil, Bangladesh, and Kenya.

The Murdoc Botnet comprises malware variants derived from Mirai and BASHLITE. These malware strains are capable of executing multiple DDoS attack methods, updating malware, and enabling proxy services. The attacks typically involve infiltrating IoT devices, deploying a loader malware to fetch the main payload, and connecting to a command-and-control (C2) server for further instructions.

Recommendations for Protection

To mitigate the risks posed by the Murdoc Botnet and similar campaigns, cybersecurity experts recommend the following measures:

  1. Monitor Activity: Regularly monitor for suspicious processes, events, and network traffic generated by untrusted binaries or scripts.
  2. Apply Firmware Updates: Ensure all IoT devices run the latest firmware versions to patch known vulnerabilities.
  3. Secure Credentials: Change default usernames and passwords to strong, unique combinations.
  4. Network Segmentation: Isolate IoT devices from critical infrastructure to limit lateral movement in the event of compromise.
  5. Deploy Security Solutions: Utilize intrusion detection and prevention systems to identify and block malicious activity.

Conclusion

The Murdoc Botnet campaign underscores the persistent threat posed by IoT vulnerabilities. With attackers continuously evolving their tactics, organizations and individuals must remain vigilant, adopting robust security practices to safeguard their devices and networks. Failure to do so could result in severe disruptions, particularly for industries reliant on IoT technology.


Similar Articles
Image Description
Vulnerability Management Following the election, DDoS assaults persist against Meduza, an autonomous media outlet in Russia.

The first attack started on April 15 and lasted about 48 hours. Over those two days, Meduza's website was targeted by 2 billion fake use ...

  • By DragonX Team

  • Updated Apr 30, 2024

Web Security

Cybersecurity researchers have raised alarms about a large-scale campaign exploiting vulnerabilities in AVTECH IP cameras and Huawei HG532 routers. This campaign has been linked to a Mirai botnet variant known as the Murdoc Botnet. According to Shilpesh Trivedi, a security researcher at Qualys, the ongoing activity demonstrates advanced capabilities, targeting security flaws to compromise devices and establish expansive botnet networks.

Campaign Overview

The Murdoc Botnet campaign has been active since at least July 2024, with over 1,370 systems infected so far. A significant number of these infections have been identified in Malaysia, Mexico, Thailand, Indonesia, and Vietnam. The attackers leverage known vulnerabilities, including CVE-2017-17215 and CVE-2024-7029, to gain initial access to Internet of Things (IoT) devices. Once access is gained, a shell script is deployed to download and execute the botnet malware, tailored to the specific CPU architecture of the device.

The primary objective of these attacks is to weaponize the botnet for distributed denial-of-service (DDoS) attacks, which can cripple targeted networks and systems.

Exposure and Impact

A search on the Censys exposure management platform revealed that more than 37,995 AVTECH cameras are currently exposed online. These devices are predominantly located in Taiwan, Vietnam, Indonesia, the United States, and Sri Lanka.

The Murdoc Botnet campaign follows a series of similar incidents involving Mirai botnet variants. For instance:

  1. gayfemboy Botnet: Exploited a newly disclosed vulnerability in Four-Faith industrial routers in November 2024.
  2. CVE-2024-7029 Exploitation: Malicious actors enlisted AVTECH devices into a botnet in mid-2024.
  3. Japanese DDoS Attacks: Major corporations and banks in Japan faced large-scale DDoS attacks by the end of 2024. Targets also included organizations in the U.S., Bahrain, Poland, Spain, Israel, and Russia.

Botnet Operations

The DDoS attacks primarily target sectors such as telecommunications, technology, hosting, cloud computing, banking, gaming, and financial services. Currently, over 55% of compromised devices are located in India, followed by South Africa, Brazil, Bangladesh, and Kenya.

The Murdoc Botnet comprises malware variants derived from Mirai and BASHLITE. These malware strains are capable of executing multiple DDoS attack methods, updating malware, and enabling proxy services. The attacks typically involve infiltrating IoT devices, deploying a loader malware to fetch the main payload, and connecting to a command-and-control (C2) server for further instructions.

Recommendations for Protection

To mitigate the risks posed by the Murdoc Botnet and similar campaigns, cybersecurity experts recommend the following measures:

  1. Monitor Activity: Regularly monitor for suspicious processes, events, and network traffic generated by untrusted binaries or scripts.
  2. Apply Firmware Updates: Ensure all IoT devices run the latest firmware versions to patch known vulnerabilities.
  3. Secure Credentials: Change default usernames and passwords to strong, unique combinations.
  4. Network Segmentation: Isolate IoT devices from critical infrastructure to limit lateral movement in the event of compromise.
  5. Deploy Security Solutions: Utilize intrusion detection and prevention systems to identify and block malicious activity.

Conclusion

The Murdoc Botnet campaign underscores the persistent threat posed by IoT vulnerabilities. With attackers continuously evolving their tactics, organizations and individuals must remain vigilant, adopting robust security practices to safeguard their devices and networks. Failure to do so could result in severe disruptions, particularly for industries reliant on IoT technology.


Similar Articles
Image Description
Web Security Cloud Security

Cloud security refers to the set of measures and strategies designed to protect data, applications, and infrastructure hosted in cloud environments ...

  • By DragonX Team

  • Updated Mar 15, 2024



Latest News and Updates

Latest News

  • Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations

    1

    Posted Date Jan 25, 2025

    Android's New Identity...

    Google has launched a new...
  • DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations

    2

    Posted Date Jan 25, 2025

    DoJ Indicts 5...

    The U.S. Department of Justice...
  • RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations

    3

    Posted Date Jan 25, 2025

    RANsacked: Over 100...

    A group of academics has...
  • Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

    4

    Posted Date Jan 24, 2025

    Beware: Fake CAPTCHA...

    Cybersecurity researchers are calling attention...
  • Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

    5

    Posted Date Jan 24, 2025

    Palo Alto Firewalls...

    An exhaustive evaluation of three...
X
DragonX Cookie Policy

At DragonX, we employ cookies on our website to enhance the site, providing the best service and customer experience possible

Category

Necessary (Always active)

These cookies enable essential site features like secure log-in and consent preference adjustments, without storing any personally identifiable data

Functional

This category aids in specific functions such as sharing website content on social media platforms, receiving feedback, and incorporating third-party features

Analytics

Analytical cookies are utilized to comprehend visitor interactions on the website, offering insights into metrics like visitor numbers, bounce rates, and traffic sources

Performance

These cookies help in understanding and analyzing important performance indicators of the website to enhance the user experience

Advertisement

Tailored advertisements are provided to visitors based on previously visited pages, while also evaluating the effectiveness of ad campaigns