Murdoc Botnet: A Growing Threat to IoT Devices Worldwide

Listen to this Post

2025-01-22

In the ever-evolving landscape of cybersecurity, a new threat has emerged, targeting vulnerable Internet of Things (IoT) devices. Cybersecurity researchers have uncovered a large-scale campaign exploiting security flaws in AVTECH IP cameras and Huawei HG532 routers. These devices are being roped into a Mirai botnet variant known as the Murdoc Botnet. This campaign, active since at least July 2024, has already infected over 1,370 systems, with the majority located in Malaysia, Mexico, Thailand, Indonesia, and Vietnam.

The Murdoc Botnet demonstrates enhanced capabilities, leveraging known vulnerabilities such as CVE-2017-17215 and CVE-2024-7029 to gain initial access to IoT devices. Once inside, the botnet downloads a shell script that fetches and executes malware tailored to the device’s CPU architecture. The ultimate goal? To weaponize these devices for distributed denial-of-service (DDoS) attacks.

This development follows the discovery of another Mirai variant, gayfemboy, which exploited a recently disclosed flaw in Four-Faith industrial routers. Similarly, CVE-2024-7029 was previously abused to enlist AVTECH devices into a botnet. The trend is clear: IoT devices are increasingly becoming targets for botnet operators.

Last week, a separate large-scale DDoS campaign targeting Japanese corporations and banks came to light. This campaign, active since late 2024, utilized an IoT botnet formed by exploiting vulnerabilities and weak credentials. Other affected regions include the U.S., Bahrain, Poland, Spain, Israel, and Russia. The primary targets? Telecommunications, technology, hosting, cloud computing, banking, gaming, and financial services sectors. Over 55% of the compromised devices are located in India, followed by South Africa, Brazil, Bangladesh, and Kenya.

According to Trend Micro, the botnet comprises malware variants derived from Mirai and BASHLITE. Its capabilities include executing various DDoS attack methods, updating malware, and enabling proxy services. The attack chain typically involves infiltrating IoT devices to deploy a loader malware, which then fetches the actual payload. This payload connects to a command-and-control (C2) server, awaiting instructions for DDoS attacks or other malicious activities.

To protect against such threats, experts recommend monitoring suspicious processes, events, and network traffic. Additionally, applying firmware updates and changing default usernames and passwords are critical steps to secure IoT devices.

What Undercode Say:

The rise of the Murdoc Botnet underscores a growing trend in the cybersecurity landscape: the exploitation of IoT devices for large-scale attacks. As IoT adoption continues to surge, so does the attack surface for cybercriminals. The Murdoc Botnet is a stark reminder of the vulnerabilities inherent in these devices, often due to poor security practices such as weak credentials and outdated firmware.

The Evolution of Botnets

Botnets like Murdoc are not new, but their sophistication is increasing. By leveraging known vulnerabilities, attackers can quickly compromise thousands of devices. The use of shell scripts to fetch and execute malware based on CPU architecture demonstrates a level of adaptability that makes these botnets particularly dangerous. This modular approach allows attackers to tailor their payloads to specific devices, maximizing their reach and impact.

The Role of IoT in Modern Cyberattacks

IoT devices are attractive targets for several reasons. Many are designed with convenience in mind, often at the expense of security. Default credentials, lack of regular updates, and insufficient monitoring make them easy prey for botnet operators. Once compromised, these devices can be used for a variety of malicious activities, from DDoS attacks to data exfiltration.

Geographic Concentration of Attacks

The geographic distribution of infected devices is also noteworthy. Countries like India, South Africa, and Brazil, which are experiencing rapid IoT adoption, are particularly vulnerable. This highlights the need for global cooperation in addressing IoT security challenges. Governments, manufacturers, and users must work together to establish and enforce security standards.

The DDoS Threat Landscape

DDoS attacks remain a favored tool for cybercriminals due to their disruptive potential. By targeting critical sectors such as telecommunications, banking, and cloud computing, attackers can cause significant financial and reputational damage. The Murdoc Botnet’s ability to incorporate various DDoS attack methods makes it a formidable threat.

Mitigation Strategies

To combat these threats, a multi-layered approach is essential. Regular firmware updates, strong authentication mechanisms, and network monitoring are critical first steps. Additionally, manufacturers must prioritize security in the design phase, ensuring that devices are resilient to common attack vectors.

The Broader Implications

The Murdoc Botnet is more than just a technical challenge; it represents a broader issue in the cybersecurity ecosystem. As our reliance on IoT devices grows, so does the potential for large-scale disruptions. Addressing this issue requires a shift in mindset, from reactive to proactive security practices.

In conclusion, the Murdoc Botnet is a wake-up call for the IoT industry. While the convenience of connected devices is undeniable, their security cannot be an afterthought. By taking collective action, we can mitigate the risks and ensure a safer digital future.

References:

Reported By: Thehackernews.com
https://stackoverflow.com
Wikipedia: https://www.wikipedia.org
Undercode AI: https://ai.undercodetesting.com

Image Source:

OpenAI: https://craiyon.com
Undercode AI DI v2: https://ai.undercode.help