Network Security, Vulnerability Management, Threat Intelligence

Industrial router zero-day leveraged by new Mirai-based botnet

botnet computer virus red background

Over 20 industrial router and smart home device vulnerabilities — including the recently disclosed Four-Faith router bug, tracked as CVE-2024-12856, DVR flaws, and PZT camera issues — have been exploited by a new and increasingly advanced Mirai-based botnet to facilitate distributed denial-of-service attacks, reports BleepingComputer.

Organizations in different sectors around the world, particularly in China, the U.S., Germany, the UK, and Singapore, have been impacted by the botnet's DDoS attacks, which amassed significant traffic despite lasting for only 10 to 30 seconds, an analysis from Chiainxin X Lab researchers revealed. Further examination of the botnet, which is named after a homophobic reference, showed its utilization of a brute-forcing module and a modified UPX shell alongside Mirai-based commands for client updating, network scanning, and DDoS intrusions that enable escalated compromise rates through zero- and n-day vulnerabilities. Organizations have been urged to not only apply the most recent device updates and replace default admin credentials but also remove unnecessary remote access to circumvent attack risk.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds