21 June 2023

New Condi malware hijacks TP-Link routers to build an army of bots


New Condi malware hijacks TP-Link routers to build an army of bots

Researchers with FortiGuard Labs discovered a piece of botnet malware called “Condi” that exploits a vulnerability in TP-Link Archer routers to comprise them in a DDoS botnet.

FortiGuard researchers say they have been observing a spike in the number of Condi samples since the end of May.

Condi is said to have been developed by a threat actor known as zxcr9999 who runs a Telegram channel called Condi Network to advertise their warez. The Telegram channel was started in May 2022, and the threat actor has been monetizing its botnet by providing DDoS-as-a-service and selling the malware source code.

The malware exploits a command injection vulnerability (CVE-2023-1389) in vulnerable TP-Link Archer AX21 (AX1800) routers to hijack the devices. It also uses several techniques to keep itself running in an infected system and prevents infections from other botnets by attempting to terminate their processes.

Unlike most DDoS botnets, Condi doesn’t use brute force to propagate. It comes with a scanner modified from Mirai’s original Telnet scanner to scan for any public IPs with open ports 80 or 8080 (commonly used for HTTP servers) and then sends a hardcoded exploitation request to download and execute a remote shell script. This script then will infect the device with Condi if it is a vulnerable TP-Link Archer AX21 device.

“While the sample we analyzed only contained the scanner for CVE-2023-1389, other Condi botnet samples were also seen exploiting other vulnerabilities to propagate. The publicly available source code for older versions also includes scanners for known vulnerabilities exploited by other Mirai variants,” the researchers noted.

FortiGuard also said they discovered source code for an older version of Condi that scans for devices with an open Android Debug Bridge port (TCP/5555).

“Malware campaigns, especially botnets, are always looking for ways to expand. Exploiting recently discovered (or published) vulnerabilities have always been one of their favored methods,” the researchers cautioned, urging users to always apply security updates and patches.


Back to the list

Latest Posts

What is Vulnerability Management? A Beginner's Guide

What is Vulnerability Management? A Beginner's Guide

In this article will try to cover basics of vulnerability management process and why it is important to every company.
11 September 2024
Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024