Mirai Bot now incorporating (malformed?) DrayTek Vigor Router Exploits
March 17, 2025, 10:08 a.m.
Description
A report details the incorporation of exploits targeting DrayTek Vigor routers into the Mirai botnet. Previously disclosed vulnerabilities affecting approximately 700,000 devices are being exploited, with attacks focusing on the 'keyPath' and 'cvmcfgupload' parameters. A curious spike in malformed exploit attempts, missing a dash in 'cgi-bin', has been observed. The attacks aim to upload and execute bot variants, primarily Mirai. The latest malformed exploit attempts to download a multi-architecture bash script and the actual bot. String analysis of the bot reveals attempts to exploit other vulnerabilities and likely includes a brute force component.
Tags
Date
- Created: March 17, 2025, 5:39 a.m.
- Published: March 17, 2025, 5:39 a.m.
- Modified: March 17, 2025, 10:08 a.m.
Indicators
- 80bfbbbe5c5b9c78e391291a087d14370e342bd0ec651d9097a8b04694e7c9b9
- 45.116.104.123
- http://45.116.104.123/h0r0zx00xh0r0zx00xdefault/h0r0zx00x.x86
Attack Patterns
- Mirai
- Mirai
- T1021.002
- T1021.001
- T1059.004
- T1498
- T1499
- T1190
- T1133
- T1078
- T1072