Sunday, April 6, 2025
HomeBotnetHackers Bypass Symantec Web Gateways Using Mirai & Hoaxcalls Botnets

Hackers Bypass Symantec Web Gateways Using Mirai & Hoaxcalls Botnets

Published on

SIEM as a Service

Follow Us on Google News

A new Mirai and Hoaxcalls botnet campaign which is attacking post-authentication class of the Symantec Secure Web Gateway Remote code execution vulnerability.

Mirai is one of the well-known IoT Malware that targets IoT devices such as IP cameras and DVRs to take control of those devices by taking advantage of open ports and default credentials, exploiting disclosed and non-disclosed vulnerabilities, and add them in botnet network.

Mirai malware has a strong background of infecting devices and has been used in most disruptive DDoS attacks on various platforms but in this campaign, it is utilizing credential brute force and exploitation of the Symantec Secure Web Gateway RCE vulnerability.

Hoaxcalls is an IoT variant of Tsunami and Gafgyt Botnets Family. It was first detected in April 2020.

This malware has the ability to proxy traffic, launch a large number of DDoS attacks. download updates, prevent reboots, and maintain continuous across device restarts.

Hoaxcalls Examination :

Samples of the same botnet include an exploit targeting the End-Of-Life Symantec Secure Web Gateway v5.0.2.8 with an HTTP request in the format:

HTTP Request Format

As seen in the above snapshot, some samples reach out to a URL for a public file upload service (plexle[.]us) where the post-exploitation payload is hosted.

The URL contacted for the update serves a shell script that downloads and executes binaries from attacker-controlled URLs.

Update URL Snapshot

According to the Palo Alto networks research, Palo Alto Networks customers are secured from this attack. Threat Prevention blocks all exploits and Wild Fire recognizes all related samples with suspicious findings.

As per Symantec Research team , they don’t have any proof that any other firmware versions are vulnerable as of now.

They also committed that there is no exploited vulnerability present in Symantec Secure Web Gateway 5.0.2.8 and the authentication is required for the successful exploitation of the Symantec Secure Web Gateway RCE.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Latest articles

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

Beware of Clickfix: ‘Fix Now’ and ‘Bot Verification’ Lures Deliver and Execute Malware

A sophisticated browser-based malware delivery method, dubbed ClickFix, has emerged as a significant threat...

DeepSeek-R1 Prompts Abused to Generate Advanced Malware and Phishing Sites

The release of DeepSeek-R1, a 671-billion-parameter large language model (LLM), has sparked significant interest...