Tuesday, December 5, 2023

Hackers Spreading Hoaxcalls DDoS Botnet by Exploiting an Unpatched ZyXel RCE 0-Day Bug Remotely

Researchers uncovered a new variant of Hoaxcalls Botnet that spreading through exploiting the unpatched remote code vulnerability that resides in ZyXEL Cloud CNM SecuManager.

Zyxel Cloud CNM secuManagr is a network management software designed to provide an integrated console to monitor and manage security gateways.

Hoaxcalls Botnet was initially uncovered by the Palo Alto research team on April 3 when the botnet was propagating via 2 patched vulnerabilities, while the Hoaxcalls carrying nearly 16 DDoS attack vectors.

The previous version of the botnet utilized three DDoS attack vectors: UDP, DNS, and HEX flood to attack the victim’s network by exploiting the RCE and SQL injection vulnerabilities.

The newly upgraded variant has contained new attack capabilities compared to the previous sample and, it was uncovered while monitoring the XTC Mirai campaign.

Exploiting ZyXEL Cloud CNM SecuManager

April 20, Researchers from Radware uncovered the new campaign utilizing the unpatched vulnerability in ZyXEL Cloud CNM SecuManager through new malware sever (IP 78.33.64.107).

Also, the current method of propagating contains major changes with 19 DDoS attack vectors, and the threat group behind XTC and Hoaxcalls includes a number of variants using different combinations of propagation exploits and DDoS attack vectors.

Zyxel Cloud CNM contains an unauthorized remote code execution vulnerability that can be exploited remotely through API calls that abuse the path / live / CPEManager / AXCampaignManager / delete_cpes_by_ids? Cpe_ids =

According to Radware report “A Remote Code Execution (RCE) attack is possible by abusing an insecure API due to unsafe calls to eval():”

Botnet loader script is hosted on the malware sever to leverage the exploit from the C2 servers using the following C2 server command.

HTTPOPTION – http option flood
HTTPDELETE – http delete flood
HTTPTRACE – http trace flood
HTTPPOST – http post flood
HTTPHEAD – http head flood
HTTPGET – http get flood
HTTPPUT – http put flood
VSE 32 0 0 10 – vse flood
SYN 32 0 10 – syn flood
RST 32 0 10 – rst flood
PSH 32 0 10 – psh flood
TCP 32 0 10 – tcp flood
URG 32 0 10 – urg flood
ACK 32 0 10 – ack flood
FIN 32 0 10 – fin flood
UDP 32 10 – udp flood
HEX – hex flood
DNS – dns resolver flood
BLACKNURSE – blacknurse flood

Researchers believe that the attackers behind this campaign is working hard to find the new vulnerabilities leveraging new exploits to building a botnet that can be leveraged for large scale DDoS attacks.

You can read the complete report of Hoaxcalls DDoS Botnet operation here.

Also Read: Moobot Botnet Hacks Various Fiber Routers Using 0-day Vulnerability

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles