Palo Alto researchers uncovered a series of ongoing attacks to spread a variant of the infamous Mirai bot exploiting multiple vulnerabilities.

Security experts at Palo Alto Networks disclosed a series of attacks aimed at delivering a Mirai variant leveraging multiple vulnerabilities.

Below the list of vulnerabilities exploited in the attacks, three of which were unknown issues:

1VisualDoorSonicWall SSL-VPN Remote Command Injection VulnerabilityCritical
2CVE-2020-25506D-Link DNS-320 Firewall Remote Command Execution VulnerabilityCritical
3CVE-2021-27561 and CVE-2021-27562Yealink Device Management Pre-Auth ‘root’ Level Remote Code Execution VulnerabilityCritical
4CVE-2021-22502Remote Code Execution Vulnerability in Micro Focus Operation Bridge Reporter (OBR), affecting version 10.40Critical
5CVE-2019-19356Resembles the Netis WF2419 Wireless Router Remote Code Execution VulnerabilityHigh
6CVE-2020-26919Netgear ProSAFE Plus Unauthenticated Remote Code Execution VulnerabilityCritical
7UnidentifiedRemote Command Execution Vulnerability Against an Unknown TargetUnknown
8UnidentifiedRemote Command Execution Vulnerability Against an Unknown TargetUnknown
9Unknown VulnerabilityVulnerability Used by Moobot in the Past, Although the Exact Target is Still UnknownUnknown

“The attacks are still ongoing at the time of this writing. Upon successful exploitation, the attackers try to download a malicious shell script, which contains further infection behaviors such as downloading and executing Mirai variants and brute-forcers.” reads a post published by Palo Alto Networks’ Unit 42.

The attacks were first observed on February 16, experts noticed that upon successful exploitation, the malicious code uses the wget utility to download a shell script from the C2. The shell script downloads several Mirai binaries that were compiled for different architectures, then it executes these binaries one by one.

Mirai bot wget

Experts noticed that the malware also downloads more shell scripts that retrieve brute-forcers that could be used to target devices protected with weak passwords.

[출처 : SecurityAffairs/ 3.15.]