Remove Authentication Remove DDOS Remove Firmware
article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

The researchers found that the botnet comprises MikroTik routers with various firmware versions, including recent ones. The botnet uses compromised MikroTik devices as SOCKS proxies, masking malicious traffic origins and enabling other actors to exploit them without authentication, amplifying its scale.

DNS 139
article thumbnail

Aquabot variant v3 targets Mitel SIP phones

Security Affairs

A new variant of the Mirai-based botnet Aquabot targets vulnerable Mitel SIP phones to recruit them into a DDoS botnet. Aquabot is a Mirai-based botnet designed for DDoS attacks. In mid-July 2024, Mitel addressed the vulnerability with the release of firmware updates. HF1 (R6.4.0.136). ” continues the report.

DDOS 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Home routers are being hijacked using vulnerability disclosed just 2 days ago

Malwarebytes

Router firmware. Under the description of CVE-2021-20090 you will find: “a path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.”. Mitigation.

Firmware 136
article thumbnail

Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways

Security Affairs

Palo Alto Networks Unit 42 researchers observed both the Mirai and Hoaxcalls botnets using an exploit for a post-authentication Remote Code Execution vulnerability in legacy Symantec Web Gateways 5.0.2.8. Experts note that the exploit is only effective for authenticated sessions and the affected devices are End of Life (EOL) from 2012.

IoT 141
article thumbnail

Attackers are hacking NSC Linear eMerge E3 building access systems to launch DDoS attacks

Security Affairs

Researchers from SonicWall revealed that hackers are attempting to compromise Linear eMerge E3 smart building access systems to recruit them in a DDoS botnet. CVE-2019-7256 is actively being exploited by DDoS botnet operators. “ Attackers can easily obtain default passwords and identify internet-connected target systems. .”

DDOS 98
article thumbnail

Millions of home routers on Mirai Botnet Radar

CyberSecurity Insiders

According to a research carried out by Maryland based Cybersecurity firm Tenable, hackers are targeting millions of home routers to add them to the Mirai botnet radar that is used to launch DDoS Cyber attack campaigns.

Firmware 136
article thumbnail

Router security in 2021

SecureList

They make the router much easier to hack, which gives the opportunity to get round password protection features (such as CAPTCHA or a limited number of login attempts), run third-party code, bypass authentication, send remote commands to the router or even disable it. Mirai is not the only DDoS malware to target routers. Conclusion.

DDOS 133