Site icon TheCyberThrone

IoT Devices Targeted by V3G4 Mirai

Advertisements

Threat actors are seen leveraging a Mirai botnet variant called V3G4 in several campaigns targeting 13 unpatched vulnerabilities found in a range of IoT devices to propagate. A successful exploit could lead to remote code execution.

Mirai is a well-known threat, known for evolving its tactics to exploit devices to its control and for expanding its botnet.

Three campaigns from July to December 2022 has been examined, in those upon exploit, the wget and curl utilities automatically executed to download Mirai client samples from malware infrastructure and then executed the downloaded bot clients.

Advertisements

V3G4 inherits its most significant feature from the original Mirai variant. Like the original Mirai, it also encrypts all credentials with XOR key 0x37.

The threat actors behind Mirai were most recently observed exploiting a known critical vulnerability, CVE-2022-46169, found in the Cacti device monitoring tool. The attacks aimed to deliver Mirai malware and a PERL-based IRC botnet. Successful exploits spurred the launch of a host-based reverse shell.

Researchers observed that once compromised by the V3G4 variant, the attackers can fully control the device and the platform becomes part of the botnet. Later it can be used to deliver array of attacks

V3G4 will then initialize the table of telnet/SSH login credentials in the scanner function, before spreading through brute forcing network devices that leverage weak username and password combinations.

Devices targeted by this campaign and respective vulnerabilities

These vulnerabilities have a lower attack complexity than observed with previously observed botnet variants, but still manage to maintain a critical security impact able to enable remote code execution. Evidence revealed the use of the same hardcoded C2 domains, nearly identical malware shell script downloaders, and the same XOR decryption key used in each campaign.

Advertisements

The TTP used in these campaigns is not new for Mirai, which is well known for its tactics that co-opt IoT devices for launching DDoS attacks. A spike in Mirai activity in February 2022 corresponded with the disclosure of Spring4Shell, a zero-day campaign on the Java web application framework, Spring Core.

Much like the recent campaigns, the previous attacks enabled unauthenticated remote code execution and further expanded the Mirai botnet.

This research was documented by researchers from Palo Alto Unit 42

Indicators of Compromise

Malware Host

Shell Script Downloader

V3G4 Sample

Exit mobile version