Monday, April 28, 2025
HomeBotnetMirai Botnet Variant Exploits Zero-Day Vulnerabilities in Routers

Mirai Botnet Variant Exploits Zero-Day Vulnerabilities in Routers

Published on

SIEM as a Service

Follow Us on Google News

Researchers observed the Gayfemboy botnet in early 2024 as a basic Mirai variant. Still, the botnet rapidly evolved through iterative development, including UPX polymorphic packing, integrating N-day vulnerabilities, and ultimately leveraging a 0-day vulnerability in Four-Faith industrial routers. 

By November 2024, Gayfemboy had infected over 15,000 devices, utilizing over 40 grouping categories for command and control. Upon detecting researchers’ registration of its C2 domains, Gayfemboy aggressively retaliated with DDoS attacks.

The analysis demonstrates the botnet’s rapid evolution from a generic threat to a significant player in the botnet landscape, equipped with advanced capabilities and a proactive defense mechanism.

- Advertisement - Google News
Geographical distribution of attack targets
Geographical distribution of attack targets

The Gayfemboy botnet leverages various vulnerabilities, including critical remote code execution flaws like CVE-2024-12856 (Four-Faith router 0-day) and undisclosed vulnerabilities affecting Neterbit and Vimar devices. 

It combined with the exploitation of well-known CVEs (e.g., CVE-2013-3307, CVE-2014-8361, and CVE-2020-25499) and leveraging weak Telnet credentials allows the botnet to maintain a significant presence, with approximately 15,000 daily active bots. 

Infections are widespread, with notable concentrations observed in China, the United States, Iran, Russia, and Turkey. The botnet likely utilizes the compromised devices for a variety of malicious activities, including DDoS attacks, data exfiltration, and cryptocurrency mining.

Attack command records
Attack command records

It communicates with a Command and Control (C2) server, transmitting grouping information, such as device operating system or infection method, which allows attackers to efficiently manage and control the botnet. 

Key affected devices include ASUS routers (infected via NDAY exploits), Kguard DVRs (NDAY), Four-Faith industrial routers (0DAY exploit CVE-2024-12856), and various routers and smart home devices (infection method unknown).

The Gayfemboy botnet is a Mirai-based botnet that has been active since February 2024 and targets hundreds of different entities each day and its attacks are spread across the globe. 

It uses a modified UPX shell with the magic number 1wom and also hides the malicious process by attempting to find writable directories starting from the root directory upon startup. 

Not only does the botnet keep the Mirai command format, but it also modifies the registration packet and adds new command functionalities.

multiple custom parameters
multiple custom parameters

DDoS attacks leverage distributed botnets, malicious tools, or amplification techniques to overwhelm target networks with excessive traffic and deplete available resources, causing service disruption and denial. 

According to XLab, attackers exploit diverse attack vectors, including volumetric, protocol, and application layer attacks, often employing sophisticated techniques like reflection/amplification and low-and-slow attacks. 

Organizations must implement countermeasures such as traffic scrubbing, rate limiting, and intrusion detection systems to mitigate the impact of DDoS attacks and ensure business continuity.

ANY.RUN Threat Intelligence Lookup - Extract Millions of IOC's for Interactive Malware Analysis: Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

CISA Alerts Users to Security Flaws in Planet Technology Network Products

The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security...

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple's flagship mobile operating...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

CISA Alerts Users to Security Flaws in Planet Technology Network Products

The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security...