InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Quad7 Botnet Expands, Targeting SOHO Routers and VPN Appliances
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Quad7 Botnet Expands, Targeting SOHO Routers and VPN Appliances
Technology

Quad7 Botnet Expands, Targeting SOHO Routers and VPN Appliances

September 11, 2024 4 Min Read
Share
Quad7 Botnet
SHARE
 
 

The operators of the mysterious Quad7 botnet continue to aggressively evolve, using a combination of known and unknown security flaws to compromise multiple brands of SOHO routers and VPN appliances.

According to a new report from French cybersecurity firm Sekoia, targets include devices from TP-LINK, Zyxel, Asus, Axentra, D-Link and NETGEAR.

“The operators of the Quad7 botnet appear to be evolving their toolset, deploying new backdoors, and exploring new protocols with the aim of increasing stealth and evading the tracking capabilities of their Operational Relay Boxes (ORBs),” researchers Felix Aimé, Pierre-Antoine D. and Charles M. said.

Quad7 (aka 7777) was first disclosed publicly in October 2023 by independent researcher Gi7w0rm, who highlighted a pattern of activity clusters trapping TP-Link routers and Dahua digital video recorders (DVRs) into a botnet.

 

The botnet, so named because it opens TCP port 7777 on compromised devices, has been observed conducting brute force attacks against Microsoft 3665 and Azure instances.

“This botnet also appears to have infected other systems, including MVPower, Zyxel NAS, and GitLab, but in very small volumes,” VulnCheck’s Jacob Baines noted in early January. “Not only does this botnet start a service on port 7777, it also starts a SOCKS5 server on port 11228.”

Subsequent analysis by Sekoia and Team Cymru over the past few months has revealed that the botnet has not only compromised TP-Link routers in Bulgaria, Russia, the US and Ukraine, but has also expanded to target ASUS routers that have TCP ports 63256 and 63260 open.

Quad7 Botnet

The latest findings reveal that the botnet is made up of three additional clusters:

  • xlogin (aka 7777 Botnet) – A botnet made up of compromised TP-Link routers with both TCP ports 7777 and 11288 open.
  • alogin (aka 63256 Botnet) – A botnet consisting of compromised ASUS routers with both TCP ports 63256 and 63260 open.
  • rlogin – A botnet consisting of compromised Ruckus Wireless devices with TCP port 63210 open.
  • axlogin – Botnet capable of targeting Axentra NAS devices (currently undetected)
  • zylogin – A botnet consisting of compromised Zyxel VPN appliances with TCP port 3256 open
See also  Ivanti warns of campaign exploiting newly patched cloud appliance vulnerability

Sequoia told Hacker News that the countries with the highest number of cases are Bulgaria (1,093 cases), the United States (733 cases) and Ukraine (697 cases).

In a further sign of evolving tactics, the threat actors are now utilizing a new backdoor, called UPDTAE, which establishes an HTTP-based reverse shell to remotely control infected devices and execute commands sent from a command and control (C2) server.

At this time, it is unclear what the exact purpose of the botnet is or who is behind it, but the company said the activity is likely the work of Chinese government-backed threat actors.

“With regards to 7777 (botnet), we have only seen brute force attacks against Microsoft 365 accounts,” Ame told the publication. “As for the other botnets, we don’t yet know how they are being used.”

“However, after consulting with other researchers and making new discoveries, we are fairly certain that this attacker is not simply a cybercriminal, but is likely sponsored by the Chinese government.” (Business Email Compromise)

“We are seeing threat actors attempting to become more stealthy by using new malware on compromised edge devices. The main objective behind this move is to prevent the tracing of associated botnets.”

 

Share This Article
Twitter Copy Link
Previous Article Demolish and Build 3 is a reverse building game, available now Demolish and Build 3 is a reverse building game, available now
Next Article Speaker Johnson halts vote on bill to avoid partial government shutdown Speaker Johnson halts vote on bill to avoid partial government shutdown
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

The Solution is Cyber ​​Hygiene

The Solution is Cyber ​​Hygiene

Cybersecurity in healthcare has never been more urgent. As the…

September 19, 2024
mm

Enterprise LLM API: A top choice for powering LLM applications in 2024

Some big recent news stories have escalated the race for…

September 19, 2024
Authentication Bypass

GitLab fixes critical SAML authentication bypass vulnerability in CE and EE editions

GitLab has released a patch to address a critical flaw…

September 19, 2024
Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

A Chinese national has been indicted in the United States…

September 19, 2024
IoT Botnet

New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide

Cybersecurity researchers have discovered a never-before-seen botnet made up of…

September 18, 2024

You Might Also Like

mm
Technology

Living Cellular Computers: The New Frontier of AI and Computing Beyond Silicon

10 Min Read
End-to-End Encryption
Technology

GSMA Plans End-to-End Encryption for Cross-Platform RCS Messaging

2 Min Read
mm
Technology

How AI can help map the universe

9 Min Read
Post-Quantum Cryptography Defense
Technology

Google Chrome switches to ML-KEM for quantum cryptography defense

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?