New Goldoon Botnet Targeting D-Link Devices
May 3, 2024, 9:47 a.m.
Description
In April 2024, FortiGuard Labs observed a new botnet exploiting a nearly decade-old D-Link vulnerability to take control of devices and incorporate them into a botnet used to launch attacks. The malware, named Goldoon, establishes persistence and connects to a C2 server to receive commands, including launching 27 different denial-of-service attack types. Organizations are advised to apply patches and updates to protect against similar botnets exploiting old vulnerabilities.
Tags
Date
- Created: May 3, 2024, 9:27 a.m.
- Published: May 3, 2024, 9:27 a.m.
- Modified: May 3, 2024, 9:47 a.m.
Indicators
- ffd2d3888b6b1289e380fa040247db6a4fbd2555db3e01fadd2fe41a0fa2debc
- fdf6dae772f7003d0b7cdc55e047434dbd089e0dc7664a3fae8ccfd9d10ece8c
- e7b78f16d0dfc91b4c7e8fd50fc31eba1eb22ec7030af9bf7c551b6019c79333
- df71219ba6f5835309479b6e3eaca73b187f509b915420656bfe9a9cc32596c2
- fc44018b7432d9e6a1e98f723b0402101fa6e7483d098b10133aac142c0a4a0b
- d7367d41d19baa4f1022f8eb47f7ff1e13f583265c7c26ab96d5f716fa0d61ee
- c81cfe4d3b98d0b28d3c3e7812beda005279bc6c67821b27571240eba440fa49
- b10e47db989e29ace6c23ed15e29f313993f95e5e615711060881dfa84618071
- b050a1ff0d205f392195179233493ff5b6f44adc93fe0dba1f78c4fe90ebcc46
- aa9e6006bce7d0b4554165dba76e67c4a44d98090c9e6ac9f3dca726f6e9adbf
- 9af8720766c5f3978718c026c2263801b08634443c93bd67022c56c6ef531ef3
- 8eb9c1eaecd0dcdd242e1bc8c62a1052915b627abe2de8ce147635fb7da3bfcc
- 712d9abe8fbdff71642a4d377ef920d66338d73388bfee542f657f2e916e219c
- 88cea61218bdeea94537b74c67873e75b8ada6d050a30d311569c3118d161c46
- 66f21251d7f8c58316f149fec104723beb979a1215ad4e788d83f0ee6fd34696
- 48130a7c09a5c92e15b3fc0d2e1eb655e0bd8f759e01ba849f7734e32dbc2652
- 5631980fab33525f4de1b47be606cd518403f54fa71b81186f02dbf7e9ed0004
- 45bf2c9c6628d87a3cb85ee78ae3e92a09949185e6da11c41e2df04a53bb1274
- 3123a458a6346fd14c5bd7d41cda6c9c9bdabc786366a9ab3d5e7c00132ff835
- 246142a5e3f3d3f84d8b38f98ff6897b03628e06e31016b8fafc9eb8c2b6201d
- 115e15fbee077a9e126cc0eb349445df34cc9404245520c702fadc5f75b6f859
- 0e6eb17664943756cab434af5d94fcd341f154cb36fc6f1ef5eb5cfdce68975f
- 037331ab84a841b9d3cfb6f8797c1695e2dc0a2cdcc3f8f3c794dfaa50bcf0df
- 94.228.168.60
Attack Patterns
- Goldoon
- Goldoon
- T1548
- T1095
- T1546
- T1529
- T1547
- T1083
- T1071
- T1543
- T1569
- T1498
- T1499
- T1204
- T1553
- T1560
- T1562
- T1090
- T1078
- T1059