Security News > 2021 > March > New botnet targets network security devices with critical exploits
Authors of a new botnet are targeting connected devices affected by critical-level vulnerabilities, some of them impacting network security devices.
Successfully compromised devices end up with a variant of the Mirai botnet malware specific to the architecture of the device.
In mid-February, security researchers at Palo Alto Networks' Unit 42 discovered attacks from this botnet and started to track its activity.
It took about a month for the botnet operator to integrate exploits for ten vulnerabilities, many of them critical, for various targets.
There are more recent exploits leveraged in these attacks, like CVE-2021-22502, a remote code execution bug in the Micro Focus Operation Bridge Reporter product from Vertica.
Unit 42 researchers say that three of the vulnerabilities the attackers exploit have yet to be identified as the targets remain unknown.
News URL
Related news
- Critical security hole in Apache Struts under exploit (source)
- 5 reasons to double down on network security (source)
- Exploit released for critical WhatsUp Gold RCE flaw, patch now (source)
- PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785) (source)
- The Future of Network Security: Automated Internal and External Pentesting (source)
- Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities (source)
- Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection (source)
- Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits (source)
- Adobe warns of critical ColdFusion bug with PoC exploit code (source)
- New botnet exploits vulnerabilities in NVRs, TP-Link routers (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-02-08 | CVE-2021-22502 | OS Command Injection vulnerability in Microfocus Operation Bridge Reporter 10.40 Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. | 9.8 |