Cyber Security News

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the “FICORA” and “CAPSAICIN,” both variants of Mirai and Kaiten, respectively, which exploit known vulnerabilities in D-Link routers, including those with outdated firmware like DIR-645, DIR-806, GO-RT-AC750, and DIR-845L. 

Attackers leverage the HNAP protocol to execute malicious commands remotely on vulnerable devices, which, despite being known for years, remains effective due to the continued presence of unpatched systems, highlighting the importance of timely firmware updates and robust security measures to mitigate the risks associated with these persistent threats.

Malicious “FICORA” command exploiting a D-Link vulnerability.

They are operating from servers located in the Netherlands and were responsible for activating the “FICORA” botnet, which had an impact on a large number of countries around the world, indicating that the attack was not targeted. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Meanwhile, the “CAPSAICIN” botnet exhibited a more focused campaign, with intense activity concentrated in East Asian countries over two days, October 21st and 22nd, 2024.

The FICORA botnet is a Linux malware variant of the Mirai botnet that can download and execute the FICORA malware using various methods like wget, ftpget, curl, and tftp. 

Embedded hexadecimal script.

Before downloading different versions of itself that are designed to target different Linux architectures, the FICORA malware first eliminates processes that have the same file extension as itself. 

The malware uses ChaCha20 encryption to store its configuration, including the C2 server domain and a unique string.

It also includes a hard-coded username and password list for brute-force attacks and embeds a shell script to identify and kill processes containing the keyword “dvrHelper.”  

Hard-coded password list.

The CAPSAICIN malware is downloaded from a malicious server and targets various Linux architectures by establishing a connection with its C2 server and sending victim host information. 

It can kill processes of other botnets, set up environment variables, and launch DDoS attacks based on commands received from the C2 server, and it appears to be a variant of botnets developed by the Keksec group.

Malware version

FortiGuard Labs discovered that the malware families “FICORA” and “CAPSAICIN” actively exploit a decade-old, patched kernel vulnerability, highlighting the persistent danger of unpatched systems. 

Despite the vulnerability’s age, these attacks remain widespread, emphasizing the critical need for regular kernel updates across all enterprise devices. 

Comprehensive monitoring systems are also essential to detect and mitigate potential malware deployments exploiting this and other vulnerabilities.

By proactively implementing these security measures, enterprises can significantly reduce their exposure to this ongoing threat.

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations by…

2 hours ago

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the notorious…

7 hours ago

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical letters…

19 hours ago

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer malware,…

19 hours ago

New PyPI Malware Targets Developers to Steal Ethereum Wallets

A recent discovery by the Socket Research Team has unveiled a malicious PyPI package named…

20 hours ago

Threat Actors Exploit PHP-CGI RCE Vulnerability to Attack Windows Machines

A recent cybersecurity threat has emerged where unknown attackers are exploiting a critical remote code…

20 hours ago