Wednesday, July 24, 2024
EHA

Hackers Bypass Symantec Web Gateways Using Mirai & Hoaxcalls Botnets

A new Mirai and Hoaxcalls botnet campaign which is attacking post-authentication class of the Symantec Secure Web Gateway Remote code execution vulnerability.

Mirai is one of the well-known IoT Malware that targets IoT devices such as IP cameras and DVRs to take control of those devices by taking advantage of open ports and default credentials, exploiting disclosed and non-disclosed vulnerabilities, and add them in botnet network.

Mirai malware has a strong background of infecting devices and has been used in most disruptive DDoS attacks on various platforms but in this campaign, it is utilizing credential brute force and exploitation of the Symantec Secure Web Gateway RCE vulnerability.

Hoaxcalls is an IoT variant of Tsunami and Gafgyt Botnets Family. It was first detected in April 2020.

This malware has the ability to proxy traffic, launch a large number of DDoS attacks. download updates, prevent reboots, and maintain continuous across device restarts.

Hoaxcalls Examination :

Samples of the same botnet include an exploit targeting the End-Of-Life Symantec Secure Web Gateway v5.0.2.8 with an HTTP request in the format:

HTTP Request Format

As seen in the above snapshot, some samples reach out to a URL for a public file upload service (plexle[.]us) where the post-exploitation payload is hosted.

The URL contacted for the update serves a shell script that downloads and executes binaries from attacker-controlled URLs.

Update URL Snapshot

According to the Palo Alto networks research, Palo Alto Networks customers are secured from this attack. Threat Prevention blocks all exploits and Wild Fire recognizes all related samples with suspicious findings.

As per Symantec Research team , they don’t have any proof that any other firmware versions are vulnerable as of now.

They also committed that there is no exploited vulnerability present in Symantec Secure Web Gateway 5.0.2.8 and the authentication is required for the successful exploitation of the Symantec Secure Web Gateway RCE.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

ShadowRoot Ransomware Attacking Organizations With Weaponized PDF Documents

A rudimentary ransomware targets Turkish businesses through phishing emails with ".ru" domain sender addresses....

BreachForumsV1 Database Leaked: Private messages, Emails & IP Exposed

BreachForumsV1, a notorious online platform for facilitating illegal activities, has reportedly suffered a massive...

250 Million Hamster Kombat Players Targeted Via Android And Windows Malware

Despite having simple gameplay, the new Telegram clicker game Hamster Kombat has become very...

Beware Of Malicious Python Packages That Steal Users Sensitive Data

Malicious Python packages uploaded by "dsfsdfds" to PyPI infiltrated user systems by exfiltrating sensitive...

Chinese Hackers Using Shared Framework To Create Multi-Platform Malware

Shared frameworks are often prone to hackers' abuses as they have been built into...

BlueStacks Emulator For Windows Flaw Exposes Millions Of Gamers To Attack

A significant vulnerability was discovered in BlueStacks, the world's fastest Android emulator and cloud...

Google Chrome 127 Released with a fix for 24 Security Vulnerabilities

Google has unveiled the latest version of its Chrome browser, Chrome 127, which is...

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles