Security News > 2020 > May > Inside the Hoaxcalls Botnet: Both Success and Failure

Inside the Hoaxcalls Botnet: Both Success and Failure
2020-05-28 21:10

The Hoaxcalls operators are among those botherders that differentiate themselves from amateur actors with the use of exploits - most of those with fewer technical skills tend to brute-force SSH and Telnet credentials in order to compromise devices and add them to their botnets.

Two new Hoaxcalls samples spotted by Radware showed up on the scene in April, incorporating new commands from its command-and-control server and a new exploit for an unpatched vulnerability impacting the ZyXEL Cloud CNM SecuManager that was disclosed in March.

Some of the exploits that the Hoaxcalls group tried but abandoned include the bugs tracked as CVE-2018-10562 and CVE-2018-10561, which are authentication-bypass and command-injection bugs for GPON home routers.

In May, researchers at Palo Alto Networks' Unit 42 division observed the latest version of the botnet exploiting this unpatched bug, which exists in a product that became end-of-life in 2015 and end-of-support-life in 2019.

"From my perspective, Hoaxcalls is really the only campaign attempting to use this exploit," Smith wrote.


News URL

https://threatpost.com/inside-hoaxcalls-botnet-success-failure/156107/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2018-05-04 CVE-2018-10561 Improper Authentication vulnerability in Dasannetworks Gpon Router Firmware
An issue was discovered on Dasan GPON home routers.
network
low complexity
dasannetworks CWE-287
critical
9.8
2018-05-04 CVE-2018-10562 OS Command Injection vulnerability in Dasannetworks Gpon Router Firmware
An issue was discovered on Dasan GPON home routers.
network
low complexity
dasannetworks CWE-78
critical
9.8