Wednesday, February 5, 2025
HomeBotnetNew Botnet Exploiting D-Link Routers To Gain Control Remotely

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Published on

SIEM as a Service

Follow Us on Google News

Researchers observed a recent surge in activity from the “FICORA” and “CAPSAICIN,” both variants of Mirai and Kaiten, respectively, which exploit known vulnerabilities in D-Link routers, including those with outdated firmware like DIR-645, DIR-806, GO-RT-AC750, and DIR-845L. 

Attackers leverage the HNAP protocol to execute malicious commands remotely on vulnerable devices, which, despite being known for years, remains effective due to the continued presence of unpatched systems, highlighting the importance of timely firmware updates and robust security measures to mitigate the risks associated with these persistent threats.

 Malicious “FICORA” command exploiting a D-Link vulnerability.

They are operating from servers located in the Netherlands and were responsible for activating the “FICORA” botnet, which had an impact on a large number of countries around the world, indicating that the attack was not targeted. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Meanwhile, the “CAPSAICIN” botnet exhibited a more focused campaign, with intense activity concentrated in East Asian countries over two days, October 21st and 22nd, 2024.

The FICORA botnet is a Linux malware variant of the Mirai botnet that can download and execute the FICORA malware using various methods like wget, ftpget, curl, and tftp. 

Embedded hexadecimal script.

Before downloading different versions of itself that are designed to target different Linux architectures, the FICORA malware first eliminates processes that have the same file extension as itself. 

The malware uses ChaCha20 encryption to store its configuration, including the C2 server domain and a unique string.

It also includes a hard-coded username and password list for brute-force attacks and embeds a shell script to identify and kill processes containing the keyword “dvrHelper.”  

Hard-coded password list.

The CAPSAICIN malware is downloaded from a malicious server and targets various Linux architectures by establishing a connection with its C2 server and sending victim host information. 

It can kill processes of other botnets, set up environment variables, and launch DDoS attacks based on commands received from the C2 server, and it appears to be a variant of botnets developed by the Keksec group.

Malware version

FortiGuard Labs discovered that the malware families “FICORA” and “CAPSAICIN” actively exploit a decade-old, patched kernel vulnerability, highlighting the persistent danger of unpatched systems. 

Despite the vulnerability’s age, these attacks remain widespread, emphasizing the critical need for regular kernel updates across all enterprise devices. 

Comprehensive monitoring systems are also essential to detect and mitigate potential malware deployments exploiting this and other vulnerabilities.

By proactively implementing these security measures, enterprises can significantly reduce their exposure to this ongoing threat.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Apache Cassandra Vulnerability Allows Attackers to Gain Access Data Centers

In a recent security advisory, a moderate-severity vulnerability has been identified in Apache Cassandra,...

1- Click RCE Vulnerability in Voyager PHP Allow Attackers Execute Arbitrary Code

A recently disclosed security vulnerability in the Voyager PHP package, a popular tool for...

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a...

ANY.RUN Enhances Malware Detection and Performance to Combat 2025 Cyber Threats

As cyber threats grow more sophisticated, ANY.RUN has unveiled a series of updates aimed...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Apache Cassandra Vulnerability Allows Attackers to Gain Access Data Centers

In a recent security advisory, a moderate-severity vulnerability has been identified in Apache Cassandra,...

1- Click RCE Vulnerability in Voyager PHP Allow Attackers Execute Arbitrary Code

A recently disclosed security vulnerability in the Voyager PHP package, a popular tool for...

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a...