7 September 2022

Moobot botnet goes after unpatched D-Link routers


Moobot botnet goes after unpatched D-Link routers

A variant of Mirai botnet known as Moobot is targeting vulnerable D-Link routers using a mix of old and new exploits, researchers at Palo Alto’s Unit 42 have warned.

First spotted by Qihoo 360's Netlab team in September 2019, Moobot has been known to target LILIN digital video recorders and Hikvision video surveillance systems to expand its network of bots.

A new wave of attacks were detected by Unit 42 team in late August 2022 and targeted D-Link routers by exploiting a number of remote code execution vulnerabilities, including:

CVE-2015-2051 - D-Link HNAP SOAPAction Header Command Execution Vulnerability

CVE-2018-6530 - D-Link SOAP Interface Remote Code Execution Vulnerability

CVE-2022-26258 - D-Link Remote Command Execution Vulnerability

CVE-2022-28958 - D-Link Remote Command Execution Vulnerability

Although the manufacturer has released security updates to fix the above flaws, many users have yet to update their devices.

Successful exploitation of these bugs allows the attackers to execute code on the vulnerable system and fetch a MooBot payload from a command and control server. Once this achieved, the newly compromised becomes a part of the Moobot botnet and used to conduct further attacks, such as DDoS.

Back to the list

Latest Posts

What is Vulnerability Management? A Beginner's Guide

What is Vulnerability Management? A Beginner's Guide

In this article will try to cover basics of vulnerability management process and why it is important to every company.
11 September 2024
Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024