Security News > 2023 > May > Andoryu Botnet Exploits Critical Ruckus Wireless Flaw for Widespread Attack

A nascent botnet called Andoryu has been found to exploit a now-patched critical security flaw in the Ruckus Wireless Admin panel to break into vulnerable devices.
While the malware is known to weaponize remote code execution flaws in GitLab and Lilin DVR for propagation, the addition of CVE-2023-25717 shows that Andoryu is actively expanding its exploit arsenal to ensnare more devices into the botnet.
Further analysis of the attack chain has revealed that once the Ruckus flaw is used to gain access to a device, a script from a remote server is dropped onto the infected device for proliferation.
The malware, for its part, also establishes contact with a C2 server and awaits further instructions to launch a DDoS attack against targets of interest using protocols like ICMP, TCP, and UDP. The cost associated with mounting such attacks is advertised via a listing on the seller's Telegram channel, with monthly plans ranging from $90 to $115 depending on the duration.
The alert follows the discovery of new versions of the RapperBot DDoS botnet that incorporate cryptojacking functionality to profit off compromised Intel x64 systems by dropping a Monero crypto miner.
RapperBot campaigns have primarily focused on brute-forcing IoT devices with weak or default SSH or Telnet credentials to expand the botnet's footprint for launching DDoS attacks.
News URL
https://thehackernews.com/2023/05/andoryu-botnet-exploits-critical-ruckus.html
Related news
- Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks (source)
- Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation's Crown Jewels (source)
- Exploit available for critical bug in VM2 JavaScript sandbox library (source)
- Hackers actively exploit critical RCE bug in PaperCut servers (source)
- Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks (source)
- Critical infrastructure also hit by supply chain attack behind 3CX breach (source)
- VMware fixes critical zero-day exploit chain used at Pwn2Own (source)
- Microsoft Warns of State-Sponsored Attacks Exploiting Critical PaperCut Vulnerability (source)
- Critical Ruckus RCE flaw exploited by new DDoS botnet malware (source)
- XWorm Malware Exploits Follina Vulnerability in New Wave of Attacks (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-02-13 | CVE-2023-25717 | Code Injection vulnerability in Ruckuswireless Ruckus Wireless Admin, Smartzone and Smartzone AP Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring. | 9.8 |