Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/14/2020
10:00 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

New Mirai Variant Surfaces with Exploits for 9 Vulnerabilities Products

Impacted products include routers, IP cameras, DVRs, and smart TVs.

Nearly four years after Mirai first showed how ordinary Internet-connected devices could be turned into remotely controlled attack systems, variants of the malware continue to surface with troubling regularity.

This week researchers from Trend Micro reported discovering a brand-new Mirai variant designed to exploit a set of previously disclosed vulnerabilities in routers, IP cameras, DVRs, and other products from multiple vendors, including Comtrend, D-Link, MV Power, Symantec, and AVTech.

Among the nine vulnerabilities the malware can exploit is a remote code execution flaw in a router model from Comtrend (CVE-2020-10173) that gives attackers a way to take control of the network managed by the router. Until this point, only proof-of-concept code for exploiting the flaw — first disclosed in March — had been available.

Another relatively new vulnerability exploited by the latest Mirai version is a remote code execution issue in Netlink GPON Router 1.0.11 that at least one other Internet of Things (IoT) botnet — a variant of Gafgyt/Bashlite — has already exploited. The remaining seven vulnerabilities are all older ones previously exploited by other malware.

"The vulnerabilities used by this Mirai variant consist of a combination of old and new that help cast a wide net encompassing different types of connected devices," said Trend Micro in a blog Monday. "The nine vulnerabilities used in this campaign affect specific versions of IP cameras, smart TVs, and routers, among others."

The new Mirai version is at least the fourth that security researchers have come across just this year. In February, researchers at Trend Micro reported finding two Mirai variants — SORA and UNSTABLE — that targeted a security weakness in a video surveillance storage device from Rasilient. In March, bug hunters at Palo Alto Networks reported on Mukashi, a Mirai variant that targeted Zyxel network-attached storage (NAS) devices.

Attackers have used such variants to compromise vulnerable IoT devices and assemble them into botnets for launching distributed denial-of-service attacks, distributing malware, or carrying out other malicious activities.

While the latest Mirai version is capable of exploiting nine different vulnerabilities, some previous variants have incorporated exploits for far more. A version of the Echobot Mirai variant last December, for instance, packaged exploits for as many as 71 unique vulnerabilities, 13 of which were previously unexploited when the malware was released.

Myla Pilao, director of security research at Trend Micro, points to a couple of of reasons for attackers' continuing interest in building Mirai-like malware. The first, she says, is the growth in the number of IoT devices and the number of people using them, especially now with so many working from home.

The second reason is that many IoT devices continue to be vulnerable or are poorly secured and therefore easy attack targets, Pilao says. In many cases, attackers have been able to force their way into routers, IP cameras, smart TVs, and other Internet-connected devices by brute-force guessing passwords or by taking advantage of insecure configurations.

The trend highlights the need for organizations to pay closer attention to the procurement of IoT devices, she notes. "Implement [a] strict protocol in the purchase, test, deployment, and adoption of these devices into your network," Pilao says.

Make sure also to implement proper authentication and credential management processes and use encryption where possible.

"Develop a clear process for quality patch management and deployment," Pilao says. With more people working from home, organizations need to ensure that employees know how to properly patch vulnerable systems, she said.

Related Content:

 

 

Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for detail on conference information and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.