Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security //

Botnet

11/8/2018
08:05 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

New Botnet Infects 100K Routers to Blast Out Spam

Qihoo 360's Netlab has found a new botnet dubbed BCMUPnP_Hunter, which can infect 100,000 home routers at a time to blast out spam by connecting to web servers for Outlook, Hotmail and Yahoo.

A newly discovered botnet is able to infect up to 100,000 home routers at a time, in order to blast out spam by connecting to webmail servers that host Outlook, Hotmail and Yahoo email accounts, according to researchers.

The botnet, which goes by the name BCMUPnP_Hunter, was first observed by researchers with Qihoo 360's Netlab in September, according to a November 7 blog post. It specifically targets home routers that have the BroadCom Universal Plug and Play (UPnP) feature enabled, which is where the botnet gets its name from.

Specifically, the botnet takes advantage of a five-year-old vulnerability in the BroadCom UPnP discovered by DefenseCode but was only disclosed in 2017. This flaw then allows an attack to execute malicious code on an unprotected router.

Since this particular Broadcom UPnP feature is used fairly universally in the home routers market, research believe that as many as 116 different devices could be targeted by the BCMUPnP_Hunter botnet.

(Source: iStock)
(Source: iStock)

Researchers found that this particular botnet is mainly active in the US, China and India.

Starting in early September, Netlab researchers first noticed multiple spikes on Transmission Control Protocol (TCP) port 5431, with more than 100,000 scans being conducted at a time. It took to team some time to tweak its honeypots in order to capture samples of the botnet at work. However, once they did, they noticed:

The interaction between the botnet and the potential target takes multiple steps, it starts with tcp port 5431 destination scan, then moving on to check target's UDP port 1900 and wait for the target to send the proper vulnerable URL. After getting the proper URL, it takes another 4 packet exchanges for the attacker to figure out where the shellcode's execution start address in memory is so a right exploit payload can be crafted and fed to the target.

Part of the attack includes a self-built proxy network, which communicates with the various webmail servers in order to send out spam. One reason for this assumption is that connection to the webservers are made through TCP port 25, which is assigned to the Simple Mail Transfer Protocol (SMTP) and helps in the transmission of email.

Over the last 12 months, various security researchers have found various attacks taking advantage of flaws and vulnerabilities within routers used either in homes or small businesses. For instance, the VPNFilter malware created a botnet based on some 500,000 infected routers before being shut down by the FBI. (See VPNFilter Is 'Swiss Army Knife' of Malware.)

In the case of VPNFilter, it's believed that a Russian-backed group was behind the attack, but the researchers at Netlab did not venture a guess of who might have started BCMUPnP_Hunter.

However, unlike some of these other botnets, BCMUPnP_Hunter appears to be a complete original, with the researchers unable to find similar source code when searching the web. "It seems that the author has profound skills and is not a typical script kid," according to the Netlab post.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-39229
PUBLISHED: 2021-09-20
Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack...
CVE-2021-41083
PUBLISHED: 2021-09-20
Dada Mail is a web-based e-mail list management system. In affected versions a bad actor could give someone a carefully crafted web page via email, SMS, etc, that - when visited, allows them control of the list control panel as if the bad actor was logged in themselves. This includes changing any ma...
CVE-2021-34650
PUBLISHED: 2021-09-20
The eID Easy WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the error parameter found in the ~/admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.6.
CVE-2021-41082
PUBLISHED: 2021-09-20
Discourse is a platform for community discussion. In affected versions any private message that includes a group had its title and participating user exposed to users that do not have access to the private messages. However, access control for the private messages was not compromised as users were n...
CVE-2020-16630
PUBLISHED: 2021-09-20
TI’s BLE stack caches and reuses the LTK’s property for a bonded mobile. A LTK can be an unauthenticated-and-no-MITM-protection key created by Just Works or an authenticated-and-MITM-protection key created by Passkey Entry, Numeric Comparison or OOB. Assume that...