Mirai Bot now incorporating (malformed?) DrayTek Vigor Router Exploits

March 17, 2025, 10:08 a.m.

Description

A report details the incorporation of exploits targeting DrayTek Vigor routers into the Mirai botnet. Previously disclosed vulnerabilities affecting approximately 700,000 devices are being exploited, with attacks focusing on the 'keyPath' and 'cvmcfgupload' parameters. A curious spike in malformed exploit attempts, missing a dash in 'cgi-bin', has been observed. The attacks aim to upload and execute bot variants, primarily Mirai. The latest malformed exploit attempts to download a multi-architecture bash script and the actual bot. String analysis of the bot reveals attempts to exploit other vulnerabilities and likely includes a brute force component.

Date

  • Created: March 17, 2025, 5:39 a.m.
  • Published: March 17, 2025, 5:39 a.m.
  • Modified: March 17, 2025, 10:08 a.m.

Indicators

  • 80bfbbbe5c5b9c78e391291a087d14370e342bd0ec651d9097a8b04694e7c9b9
  • 45.116.104.123
  • http://45.116.104.123/h0r0zx00xh0r0zx00xdefault/h0r0zx00x.x86

Attack Patterns

  • Mirai
  • Mirai
  • T1021.002
  • T1021.001
  • T1059.004
  • T1498
  • T1499
  • T1190
  • T1133
  • T1078
  • T1072