Sunday, December 29, 2024
HomeBotnetHNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims...

HNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims Networks

Published on

SIEM as a Service

HNS(Hide & Seek) IoT botnet attack victims network using router-based vulnerabilities such as  CVE-2016-10401 to propagate malicious code and steal the victim’s sensitive information.

HNS communication established through peer to peer network which one of the rare mechanism which is used by HNS as a second IoT Botnet after Hajime that is first IoT botnet that uses P2P communication.

Its very difficult task to take down the P2P network and there is a lot of updates has been implemented in HNS Botnet over the past months.

- Advertisement - SIEM as a Service

An updated version of HNS contains exploits for AVTECH devices (webcam, webcam), CISCO Linksys router, JAWS/1.0 web server, Apache CouchDB, OrientDB; with the two devices.

Also, HNS added the cpuminer mining program and also added support of OrientDB and CouchDB database.

So HNS Bonet is not only targeting the IoT devices but also it working against cross-platform and HNS presently supports 7 exploiting methods.

Also to avoid botnet attacks Enterprise Networks should choose the best DDoS Attack prevention services to ensure the DDoS attack protection and prevent their network.

Also Read:   Protect website from future attacks Also Check your Companies DDOS Attack Downtime Cost.

HNS Botnet Sample Analysis

An Initial stage of attack HNS botnet start scanning the targetted victims network and it borrows the code from powerful Mirai Botnet.

HNS  scanning for open ports including  TCP port 80/8080/2480/5984/23 and other random ports. According to 360 netlab, After implant the relevant ports the HNS will be utilizing the following exploits.

  1. TP-Link-Routers RCE
  2. Netgear RCE
  3. new: AVTECH RCE
  4. new: CISCO Linksys Router RCE
  5. new: JAW/1.0 RCE
  6. new: OrientDB RCE
  7. new: CouchDB RCE

Apart from this HNS node using 3 methods to contact to P2P, first one is from a hard-coded built-in list, second is from command-line args third one is from other P2P peers.

Check-in Process started with no Command line arguments then  HNS node will send lots of UPD check-in packets.

The Interaction Process in between HNS nodes with many characteristics to perform Peer to Peers interaction successfully and take down the victims network using various powerful router based exploits.

It using 171 hardcoded P2P peer address and the list is here.

An organization should always ensure and focus on maximum Protection level for enterprise networks and you can try a free trial to Stop DDoS Attack in 10 Seconds.

IoC

Malware Sample md5

c1816d141321276cd4621abcd280ee40    #hns x86
0770ff1a6e90eb5d083c16452e45abd5    #hns arm
30ebaaeb61a4ecae3ade7d1d4e5c7adb    #hns_miner 
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

Adobe Warns of ColdFusion Vulnerability Allows Attackers Read arbitrary files

Adobe has issued a critical security update for ColdFusion versions 2023 and 2021 to...

IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack

IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating...