By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks
Tech News

FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks

By Viral Trending Content 5 Min Read
Share
SHARE

Dec 27, 2024Ravie LakshmananBotnet / DDoS Attack

FICORA and Kaiten Botnets

Cybersecurity researchers are warning about a spike in malicious activity that involves roping vulnerable D-Link routers into two different botnets, a Mirai variant dubbed FICORA and a Kaiten (aka Tsunami) variant called CAPSAICIN.

“These botnets are frequently spread through documented D-Link vulnerabilities that allow remote attackers to execute malicious commands via a GetDeviceSettings action on the HNAP (Home Network Administration Protocol) interface,” Fortinet FortiGuard Labs researcher Vincent Li said in a Thursday analysis.

“This HNAP weakness was first exposed almost a decade ago, with numerous devices affected by a variety of CVE numbers, including CVE-2015-2051, CVE-2019-10891, CVE-2022-37056, and CVE-2024-33112.”

Cybersecurity

According to the cybersecurity company’s telemetry data, attacks involving FICORA have targeted various countries globally, whereas those related to CAPSAICIN primarily singled out East Asian territories like Japan and Taiwan. The CAPSAICIN activity is also said to have been “intensely” active only between October 21 and 22, 2024.

FICORA botnet attacks lead to the deployment of a downloader shell script (“multi”) from a remote server (“103.149.87[.]69”), which then proceeds to download the main payload for different Linux architectures separately using wget, ftpget, curl, and tftp commands.

Present within the botnet malware is a brute-force attack function containing a hard-coded list of usernames and passwords. The Mirai derivative also packs in features to conduct distributed denial-of-service (DDoS) attacks using UDP, TCP, and DNS protocols.

The downloader script (“bins.sh”) for CAPSAICIN leverages a different IP address (“87.10.220[.]221”), and follows the same approach to fetch the botnet for various Linux architectures to ensure maximum compatibility.

“The malware kills known botnet processes to ensure it is the only botnet executing on the victim host,” Li said. “‘CAPSAICIN’ establishes a connection socket with its C2 server, ‘192.110.247[.]46,’ and sends the victim host’s OS information and the nickname given by the malware back to the C2 server.”

FICORA and Kaiten Botnets

CAPSAICIN then awaits for further commands to be executed on the compromised devices, including “PRIVMSG,” a command that could be used to perform various malicious operations such as follows –

  • GETIP – Get the IP address from an interface
  • CLEARHISTORY – Remove command history
  • FASTFLUX – Start a proxy to a port on another IP to an interface
  • RNDNICK – Randomize the victim hosts’ nickname
  • NICK – Change the nickname of the victim host
  • SERVER – Change command-and-control server
  • ENABLE – Enable the bot
  • KILL – Kill the session
  • GET – Download a file
  • VERSION – Requests version of the victim host
  • IRC – Forward a message to the server
  • SH – Execute shell commands
  • ISH – Interact with victim host’s shell
  • SHD – Execute shell command and ignore signals
  • INSTALL – Download and install a binary to “/var/bin”
  • BASH – Execute commands using bash
  • BINUPDATE – Update a binary to “/var/bin” via get
  • LOCKUP – Kill Telnet backdoor and execute the malware instead
  • HELP – Display help information about the malware
  • STD – Flooding attack with random hard-coded strings for the port number and target specified by the attacker
  • UNKNOWN – UDP flooding attack with random characters for the port number and target specified by the attacker
  • HTTP – HTTP flooding attack.
  • HOLD – TCP connection flooding attack.
  • JUNK – TCP flooding attack.
  • BLACKNURSE – BlackNurse attack, which is based on the ICMP packet flooding attack
  • DNS – DNS amplification flooding attack
  • KILLALL – Stop all DDoS attacks
  • KILLMYEYEPEEUSINGHOIC – Terminate the original malware

“Although the weaknesses exploited in this attack had been exposed and patched nearly a decade ago, these attacks have remained continuously active worldwide,” Li said. “It is crucial for every enterprise to regularly update the kernel of their devices and maintain comprehensive monitoring.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

OnePlus 15 is Wake-up Call that Apple & Samsung Should Not Ignore

A Collision With Space Debris Leaves 3 Chinese Astronauts Stranded in Orbit

DoorDash email spoofing vulnerability sparks messy disclosure dispute

Keychain announcing new funding from top UK retailers and launches AI OS for retailers

Google SIMA 2 AI Self-Improvement AI, AGI Progress & Questions

TAGGED: botnet, Cyber Attack, Cyber Security, Cybersecurity, D-Link, ddos attack, Internet, Linux, Malware, mirai
Share This Article
Facebook Twitter Copy Link
Previous Article December 29th: Sunday’s Premier League Double – 7/1 Special, Betting Tips & Predictions
Next Article iPad Pro M5: Is This the Most Powerful Tablet Ever?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Meghan Trainor Then & Now: Photos of the Singer’s Transformation
Celebrity
Indie games just made history at The Game Awards 2025
Gaming News
Resident Evil Requiem Demo Isn’t Currently Planned: “We Just Want to Finish The Game”
Gaming News
Aave introduces mobile savings app with 9% interest and insurance protection
Crypto
Is Saylor’s Bitcoin Strategy A ‘Fraud’? Schiff Wants A Live Debate To Prove It
Crypto
Workers turn to ‘polyworking’ to combat frozen salaries and inflation
Business
OnePlus 15 is Wake-up Call that Apple & Samsung Should Not Ignore
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Meghan Trainor Then & Now: Photos of the Singer’s Transformation

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Meghan Trainor Then & Now: Photos of the Singer’s Transformation
November 17, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?