• Language chooser
    • USA (English)
    • France (Français)

Router Malware Attack

Released: Feb 01, 2023

Updated: Jun 15, 2023


High Severity

IoT, Routers Platform

D-link, Other Vendor

Attack Type


Highly targeted router vulnerabilities

FortiGuard Labs has observed various router vulnerabilities being exploited in the wild to distribute malware such as MooBot Malware, Lucifer Malware, BotenaGo Botnet, Zerobot Malware, Enemybot Malware. Learn More »

Background

Dec 06, 2021: FortiGuard Labs posted a blog about MooBot Malware analyzing how Moobot targets Hikvision Camera vulnerability. April 12, 2022: FortiGuard Labs posted a blog about Enemybot Malware and how it targets various router vulnerabilities such as Netgear, D-Link etc. Jan 27, 2022: FortiGuard Labs released a Threat Signal on BotenaGo Malware which targets multiple IoT devices. Dec 27, 2022: FortiGuard Labs released an Outbreak Alert about Zerobot Malware which spreads primarily through IoT and web application vulnerabilities. Please go to Additional Resources section for links to blog posts, threat signal and outbreak alert mentioned above.

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


In Jan, 2023: FortiGuard Labs observed severe IPS detections (peak of up-to 50,000 unique IPS devices) and associated malware activity exploiting older router vulnerabilities. In particular, MooBot and Enemybot Malware targeting D-Link routers (CVE-2015-2051) and Lucifer Malware, BotenaGo Botnet and Zerobot Malware exploiting vulnerabilities on unpatched Dasan GPON home routers (CVE-2018-10562, CVE-2018-10561).

FortiGuard Labs recommends upgrading the vulnerable routers to latest firmware and discontinue using end-of-life products if still in use. FortiGuard labs has already released multiple IPS and AV protections to block such attack attempts for our customers.


In June 2023: FortiGuard observed upto 18,000+ IPS devices that blocked attack attempts affecting some Zyxel CPE models. Zyxel has released firmware updates for RCE and DoS vulnerabilities which does not have assigned CVE number as of now. https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-code-execution-and-denial-of-service-vulnerabilities-of-cpe

FortiGuard Labs also observed CVE-2023-26801, a vulnerability affecting LB-LINK devices targeted by the attackers and we see IPS detections of upto 5000+ devices.

With popularity of `Work from Anywhere`, company`s employees can get compromised easily if they are using vulnerable home router devices. Fortinet Zero Trust Access solutions provide continuous verification of all users, devices and checks for device posture as they access corporate applications and data. https://www.fortinet.com/solutions/enterprise-midsize-business/network-access/application-access

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • AV

  • AV (Pre-filter)

  • IPS

DETECT
  • Outbreak Detection

  • Threat Hunting

  • Content Update

RESPOND
  • Automated Response

  • Assisted Response Services

RECOVER
  • InfoSec Services

IDENTIFY
  • Attack Surface Monitoring (Inside & Outside)

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.


Loading ...

Indicators of compromise Indicators of compromise
IOC Indicator List
Indicator Type Status
http://marcus-bishop.com/https:/edponline.edp.p... url Active
stheclahall.com.br domain Inactive
http://stheclahall.com.br/css/lok.zip url Active
37.59.51.212 ip Active
rippr.cc domain Active
91.121.87.10 ip Active
94.23.206.130 ip Active
n1gger.com domain Inactive
posqit.net domain Active
typicalniggerdayatthecoolaidparty.n1gger.com domain Inactive
31.13.195.56 ip Active
audi.n1gger.com domain Active
botnetisharam.com domain Active
raiseyourdongers.pw domain Active
darkrat.lh1.in domain Active
http://darkrat.lh1.in/login url Active
http://espadaeoliveira.com/css/lucifer/Panel/login.php url Active
http://tinuthomas.com/wp-admin/css/upload/Panel... url Active
espadaeoliveira.com domain Active
tinuthomas.com domain Active
rajas.com.my domain Active
http://rajas.com.my/wp-content/uploads/2015/nux... url Active
104.140.201.102 ip Active
107.191.99.221 ip Active
107.191.99.95 ip Active
149.202.83.171 ip Active
178.63.100.197 ip Active
37.187.154.79 ip Active
37.187.95.110 ip Active
37.59.43.131 ip Active
37.59.43.136 ip Active
37.59.44.193 ip Active
37.59.44.93 ip Active
37.59.45.174 ip Active
37.59.54.205 ip Active
37.59.55.60 ip Active
47.101.30.124 ip Active
88.99.242.92 ip Active
91.121.140.167 ip Active
91.121.2.76 ip Active
94.130.12.27 ip Active
94.130.12.30 ip Active
94.130.165.85 ip Active
94.130.165.87 ip Active
94.23.23.52 ip Active
94.23.247.226 ip Active
http://posqit.net/B/9051077.jpg url Active
http://nlocalhost.wordtheminer.com:422/ url Active
http://nlocalhost.wordtheminer.com:9746/ url Active
http://wor.wordtheminer.com:8725/ url Active
hojokk.com domain Active
http://hojokk.com/0x/Panel/login.php url Active
nlocalhost.wordtheminer.com domain Inactive
http://florapansiyonotel.com/images/jaf3/Panel/... url Active
http://rajas.com.my/js/2/webpanel/Panel/login.php url Active
http://rajas.com.my/js/9/webpanel/Panel/login.php url Active
http://rajas.com.my/js/1/webpanel/Panel/login.php url Active
http://rajas.com.my/js/8/webpanel/Panel/login.php url Active
http://rajas.com.my/js/3/webpanel/Panel/login.php url Active
http://rajas.com.my/js/10/webpanel/Panel/login.php url Active
florapansiyonotel.com domain Active
http://florapansiyonotel.com/images/jaf3//logs.php url Active
http://193.142.59.18/gon0/1/Panel/login.php url Active
193.142.59.18 ip Active
solarparkcleaning.co.uk domain Active
proxy.2u0apcm6ylhdy7s.com domain Inactive
http://193.142.59.66/L9/Panel/login.php url Active
193.142.59.66 ip Active
http://multitraction.cf/webpanel/Panel/login.php url Active
multitraction.cf domain Active
http://45.95.168.90/le.bot.arm7 url Active
d546509ab6670f9ff31783ed72875dfc0f37fa2b666bd58... file Active
36.35.164.98 ip Active
http://36.35.164.98:38776/mozi.m url Active
http://36.35.164.98:38776/ url Active
121.206.143.140 ip Active
180.126.161.27 ip Active
210.112.41.71 ip Active
http://pool.supportxmr.com:3333/ url Active
http://pool.supportxmr.com:8080/ url Active
http://qf2020.top:19370/ url Active
qf2020.top domain Active
122.112.179.189 ip Active
122.112.179.189:15888 ip Active
gulf.moneroocean.stream domain Active
http://gulf.moneroocean.stream:10001/ url Active
yzzswt.com domain Active
103.101.30.10 ip Active
107.178.104.10 ip Active
111.7.68.222 ip Active
116.203.61.78 ip Active
116.203.73.240 ip Active
116.211.169.162 ip Active
117.139.17.68 ip Active
139.180.131.153 ip Active
139.224.168.24 ip Active
139.224.20.173 ip Active
139.224.219.119 ip Active
139.99.100.250 ip Active
139.99.72.56 ip Active
Indicators of compromise Indicators of compromise
IOC Threat Activity

Last 30 days

Chg

Avg 0