A New Mirai based IoT RAT Spreading Through 2 0-day Vulnerabilities

Netlab observed a new IoT botnet exploits two Tenda router 0-day vulnerabilities to install a Remote Access Trojan (RAT).

The botnet dubbed Ttint was found to be active since November 2019, along with DDoS capabilities it includes 12 remote access functions.

Ttint IoT Botnet Attack

Attackers used following Tenda router 0-day vulnerability (CVE-2018-14558 & CVE-2020-10987) to distribute the Ttint samples.

The Tint remote access Trojan based on Mirai code, it includes 10 Mirai DDoS attack instructions & 12 control instructions such as Socket5 proxy for router devices, tampering with router DNS, setting iptables, executing custom system commands.

Once the Ttint gets executed “it deletes its files, manipulates the watchdog, and prevents the device from restarting, it runs as a single instance by binding the port; then modifies the process name to confuse the user; it finally establishes a connection with the decrypted C2, Reporting device information.”

Ttint Bot supports for 22 commands, 10 DDoS commands inherited from Mirai, and 12 new commands.

IDINSTRUCTION
0attack_udp_generic
1attack_udp_vse
2attack_udp_dns
9attack_udp_plain
3attack_tcp_flag
4attack_tcp_pack
5attack_tcp_xmas
6attack_grep_ip
7attack_grep_eth
10attack_app_http
12run “nc” command
13run “ls” command
15Execute system commands
16Tampering with router DNS
18Report device information
14Config iptables
11run “ifconfig” command
17Self-exit
19Open Socks5 proxy
20Close Socks5 proxy
21Self-upgrade
22Reverse shell

According to Netlab analysis, “the attacker first used a Google cloud service IP, and then switched to a hosting provider in Hong Kong.”

All the communication with the C2 server is encrypted and for communication, it uses WSS (WebSocket over TLS) protocol.

As with any new technology, IoT promises to be the future of the Internet, bringing better connectivity and ease of use of the devices we use, but as these two botnet attacks show, an equal amount of stress must be placed on security.

Tenda router users are recommended to check their device firmware and make the necessary update, here you can find the IoCs.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to masquerade…

1 hour ago

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message circulating…

3 hours ago

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers. By leveraging compromised…

3 hours ago

Critical SUSE Linux Distro Injection Vulnerability Allow Attackers Exploits “go-git” Library

A significant security vulnerability, designated CVE-2025-21613, has been discovered in the go-git library, used for…

3 hours ago

Apache CXF Vulnerability Triggers DoS Attack

Colm O hEigeartaigh announced a critical vulnerability affecting various versions of Apache CXF, a widely-used…

3 hours ago

Microsoft Rolls Out New Administrator Protection Feature Under Windows Security

Microsoft has announced the release of Windows 11 Insider Preview Build 27774 to the Canary…

3 hours ago