Tuesday, March 19, 2024

Hackers Bypass Symantec Web Gateways Using Mirai & Hoaxcalls Botnets

A new Mirai and Hoaxcalls botnet campaign which is attacking post-authentication class of the Symantec Secure Web Gateway Remote code execution vulnerability.

Mirai is one of the well-known IoT Malware that targets IoT devices such as IP cameras and DVRs to take control of those devices by taking advantage of open ports and default credentials, exploiting disclosed and non-disclosed vulnerabilities, and add them in botnet network.

Mirai malware has a strong background of infecting devices and has been used in most disruptive DDoS attacks on various platforms but in this campaign, it is utilizing credential brute force and exploitation of the Symantec Secure Web Gateway RCE vulnerability.

Hoaxcalls is an IoT variant of Tsunami and Gafgyt Botnets Family. It was first detected in April 2020.

This malware has the ability to proxy traffic, launch a large number of DDoS attacks. download updates, prevent reboots, and maintain continuous across device restarts.

Hoaxcalls Examination :

Samples of the same botnet include an exploit targeting the End-Of-Life Symantec Secure Web Gateway v5.0.2.8 with an HTTP request in the format:

HTTP Request Format

As seen in the above snapshot, some samples reach out to a URL for a public file upload service (plexle[.]us) where the post-exploitation payload is hosted.

The URL contacted for the update serves a shell script that downloads and executes binaries from attacker-controlled URLs.

Update URL Snapshot

According to the Palo Alto networks research, Palo Alto Networks customers are secured from this attack. Threat Prevention blocks all exploits and Wild Fire recognizes all related samples with suspicious findings.

As per Symantec Research team , they don’t have any proof that any other firmware versions are vulnerable as of now.

They also committed that there is no exploited vulnerability present in Symantec Secure Web Gateway 5.0.2.8 and the authentication is required for the successful exploitation of the Symantec Secure Web Gateway RCE.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Beware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data

The ongoing "free wedding invite" scam is one of several innovative campaigns aimed at...

Hackers Using Weaponized SVG Files in Cyber Attacks

Cybercriminals have repurposed Scalable Vector Graphics (SVG) files to deliver malware, a technique that...

New Acoustic Keyboard Side Channel Attack Let Attackers Steal Sensitive Data

In recent years, personal data security has surged in importance due to digital device...

Discontinued WordPress Plugin Flaw Exposes Websites to Cyber Attacks

A critical vulnerability was discovered in two plugins developed by miniOrange.The affected plugins,...

ShadowSyndicate Hackers Exploiting Aiohttp Vulnerability To Access Sensitive Data

A new Aiohttp vulnerability has been discovered, which the threat actor ShadowSyndicate exploits.Aiohttp...

Hackers Launching AI-Powered Cyber Attacks to Steal Billions

INTERPOL's latest assessment on global financial fraud uncovers the sophisticated evolution of cybercrime, fueled...

Fujitsu Hacked – Attackers Infected The Company Computers with Malware

Fujitsu Limited announced the discovery of malware on several of its operational computers, raising...

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles