Ficora and Capsaicin Botnets Exploit Outdated D-Link Routers in Global DDoS Surge

by | Dec 30, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Two botnets, Ficora and Capsaicin, are escalating their attacks on D-Link routers that are either outdated or have reached their end of life.

Targets and Vulnerabilities

The attacks focus on widely used devices like the DIR-645, DIR-806, GO-RT-AC750, and DIR-845L. Both botnets exploit known vulnerabilities, specifically:

  • CVE-2015-2051: A remote code execution flaw in D-Link’s management interface
  • CVE-2019-10891: Firmware authentication bypass
  • CVE-2022-37056: Improper access controls in D-Link routers
  • CVE-2024-33112: A newly identified flaw allowing remote command execution

After gaining initial access, attackers exploit weaknesses in D-Link’s management interface (HNAP) by executing malicious commands through a GetDeviceSettings action.

Attack Capabilities

Compromised devices can:

  • Steal data
  • Execute shell scripts
  • Participate in distributed denial-of-service (DDoS) attack

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Ficora Botnet

Ficora is a modernized variant of the Mirai botnet, designed specifically to exploit flaws in D-Link routers. According to Fortinet telemetry, Ficora shows random targeting but has had notable surges in activity in October and November 2024, particularly in Japan and the United States.

Location of devices infected by FicoraLocation of devices infected by Ficora
Source: Fortinet

Key Characteristics:

  • Payload Delivery: Deploys a shell script named multi to download and execute malware via multiple methods (wget, curl, ftpget, and tftp).
  • Brute Force Functionality: Employs hard-coded credentials to infect other Linux-based devices.
  • DDoS Capabilities: Implements UDP flooding, TCP flooding, and DNS amplification, maximizing the impact of its attacks.

Ficora's brute-forcing functionFicora’s brute-forcing function
Source: Fortinet

Capsaicin Botnet

Capsaicin, a variant of the Kaiten botnet, is believed to originate from the Keksec group, known for malware like EnemyBot. While its activity spiked briefly between October 21-22, it primarily targeted East Asian devices.

Names of other botnet malware Capsaicin disables.Names of other botnet malware Capsaicin disables
Source: Fortinet

Key Characteristics:

  • Infection Mechanism: Uses a downloader script (bins.sh) to fetch binaries prefixed with ‘yakuza’ for multiple architectures (e.g., arm, mips, sparc, x86).
  • Botnet Neutralization: Actively disables other botnet payloads present on infected devices.
  • DDoS Capabilities: Similar to Ficora, Capsaicin supports UDP and TCP floods while also gathering host information for exfiltration to its command-and-control (C2) server.

Capsaicin DDoS commandsCapsaicin DDoS commands
Source: Fortinet




Mitigation and Prevention Tips

To protect against threats like Ficora and Capsaicin, users and organizations should:

  1. Update Firmware: Ensure all devices run the latest firmware to patch known vulnerabilities.
  2. Replace End-of-Life Devices: Upgrade routers that no longer receive security updates.
  3. Secure Configurations:
    • Replace default admin credentials with strong, unique passwords.
    • Disable remote access interfaces unless absolutely necessary.
  4. Monitor Network Activity: Use security tools to detect unusual network behavior indicative of botnet activity.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This