Security News > 2020 > March > Multiple DDoS Botnets Exploited 0-Day Flaws in LILIN DVR Surveillance Systems
Multiple zero-day vulnerabilities in digital video recorders for surveillance systems manufactured by Taiwan-based LILIN have been exploited by botnet operators to infect and co-opt vulnerable devices into a family of denial-of-service bots.
The findings come from Chinese security firm Qihoo 360's Netlab team, who say different attack groups have been using LILIN DVR zero-day vulnerabilities to spread Chalubo, FBot, and Moobot botnets at least since August 30, 2019.
What Are the LILIN Zero-Days About? The flaw in itself concerns a chain of vulnerabilities that make use of hard-coded login credentials, potentially granting an attacker the ability to modify a DVR's configuration file and inject backdoor commands when the FTP or NTP server configurations are synchronized.
Enforce Strong Passwords Netlab said the operators behind Chalubo botnet were the first to exploit the NTPUpdate vulnerability to hijack LILIN DVRs last August.
The researchers said they reached out to LILIN twice, first after the FBot attacks, and then a second time after the Moobot infections happened.
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/TrfteovCQsw/ddos-botnets-lilin-dvr.html