Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security //

Botnet

// // //
11/8/2018
08:05 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

New Botnet Infects 100K Routers to Blast Out Spam

Qihoo 360's Netlab has found a new botnet dubbed BCMUPnP_Hunter, which can infect 100,000 home routers at a time to blast out spam by connecting to web servers for Outlook, Hotmail and Yahoo.

A newly discovered botnet is able to infect up to 100,000 home routers at a time, in order to blast out spam by connecting to webmail servers that host Outlook, Hotmail and Yahoo email accounts, according to researchers.

The botnet, which goes by the name BCMUPnP_Hunter, was first observed by researchers with Qihoo 360's Netlab in September, according to a November 7 blog post. It specifically targets home routers that have the BroadCom Universal Plug and Play (UPnP) feature enabled, which is where the botnet gets its name from.

Specifically, the botnet takes advantage of a five-year-old vulnerability in the BroadCom UPnP discovered by DefenseCode but was only disclosed in 2017. This flaw then allows an attack to execute malicious code on an unprotected router.

Since this particular Broadcom UPnP feature is used fairly universally in the home routers market, research believe that as many as 116 different devices could be targeted by the BCMUPnP_Hunter botnet.

(Source: iStock)
(Source: iStock)

Researchers found that this particular botnet is mainly active in the US, China and India.

Starting in early September, Netlab researchers first noticed multiple spikes on Transmission Control Protocol (TCP) port 5431, with more than 100,000 scans being conducted at a time. It took to team some time to tweak its honeypots in order to capture samples of the botnet at work. However, once they did, they noticed:

The interaction between the botnet and the potential target takes multiple steps, it starts with tcp port 5431 destination scan, then moving on to check target's UDP port 1900 and wait for the target to send the proper vulnerable URL. After getting the proper URL, it takes another 4 packet exchanges for the attacker to figure out where the shellcode's execution start address in memory is so a right exploit payload can be crafted and fed to the target.

Part of the attack includes a self-built proxy network, which communicates with the various webmail servers in order to send out spam. One reason for this assumption is that connection to the webservers are made through TCP port 25, which is assigned to the Simple Mail Transfer Protocol (SMTP) and helps in the transmission of email.

Over the last 12 months, various security researchers have found various attacks taking advantage of flaws and vulnerabilities within routers used either in homes or small businesses. For instance, the VPNFilter malware created a botnet based on some 500,000 infected routers before being shut down by the FBI. (See VPNFilter Is 'Swiss Army Knife' of Malware.)

In the case of VPNFilter, it's believed that a Russian-backed group was behind the attack, but the researchers at Netlab did not venture a guess of who might have started BCMUPnP_Hunter.

However, unlike some of these other botnets, BCMUPnP_Hunter appears to be a complete original, with the researchers unable to find similar source code when searching the web. "It seems that the author has profound skills and is not a typical script kid," according to the Netlab post.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file