Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

New Mirai botnet targets TP-Link and Teltonika devices

Through command injection, attackers can fetch malware binaries hosted on external servers, facilitating the addition of compromised devices to the botnet

byKerem Gülen
December 25, 2024
in News, Cybersecurity

A new Mirai-based botnet exploits vulnerabilities in several devices, focusing on unpatched DigiEver DS-2105 Pro NVRs, dated firmware on TP-Link routers, and Teltonika RUT9XX routers. The campaign commenced in October, with active exploitation traced back as far as September. Akamai researchers have confirmed ongoing attacks, which leverage multiple remote code execution flaws to enlist devices into the botnet for malicious activities.

New Mirai botnet exploits vulnerabilities in various devices

The botnet targets a specific remote code execution (RCE) vulnerability in DigiEver NVRs, which involves improper input validation in the ‘/cgi-bin/cgi_main.cgi’ URI. Hackers can remotely inject commands such as ‘curl’ and ‘chmod’ through parameters like the ntp field in HTTP POST requests. Ta-Lun Yen from TXOne previously highlighted this vulnerability, noting its impact on various DVR devices during a presentation at the DefCamp security conference.

In addition to the DigiEver flaw, the Mirai variant also exploits CVE-2023-1389 in TP-Link devices and CVE-2018-17532 in Teltonika RUT9XX routers. Researchers have noted that while the attacks on DigiEver devices have been directly observed by Akamai, they reflect similar methods previously described by Yen. The exploitation of these flaws supports a campaign aiming to establish a foothold in vulnerable devices.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


Using TP-Link? Here’s why the U.S. may ban your router


Methodology and techniques used by attackers

Through command injection, attackers can fetch malware binaries hosted on external servers, facilitating the addition of compromised devices to the botnet. Once under control, the devices can be utilized to launch distributed denial of service (DDoS) attacks or facilitate further attacks on other targets. Persistence within the infected systems is maintained by introducing cron jobs, which ensure that the malware remains active despite potential reboots or other interruptions.

Akamai’s findings highlight that this new Mirai variant features advanced encryption methods, including XOR and ChaCha20, indicating evolving tactics among botnet operators. Unlike many previous iterations of Mirai, which relied on basic string obfuscation, this variant showcases an intent to improve evasion and operational security. It targets a diverse range of architectures, including x86, ARM, and MIPS, broadening its potential impact across various device types.

Akamai researchers urge device owners and administrators to adopt proactive measures, including monitoring for indicators of compromise (IoC), that they have made available along with Yara rules for detecting and blocking the emerging threat.


 

Featured image credit: Kerem Gülen/Midjourney  

Tags: tp-link

Related Posts

Z.AI GLM-4.6 boosts context window to 200K tokens

Z.AI GLM-4.6 boosts context window to 200K tokens

October 2, 2025
OpenAI releases Sora 2, iOS app with real-world inserts

OpenAI releases Sora 2, iOS app with real-world inserts

October 2, 2025
Bitrig: SwiftUI apps from voice using Apple Intelligence

Bitrig: SwiftUI apps from voice using Apple Intelligence

October 2, 2025
Bengio warns hyper-AI preservation goals threaten humanity

Bengio warns hyper-AI preservation goals threaten humanity

October 2, 2025
Apple TV 4K to feature A17 Pro chip and Apple Intelligence

Apple TV 4K to feature A17 Pro chip and Apple Intelligence

October 2, 2025
Instagram tests Reels-first home tab in India

Instagram tests Reels-first home tab in India

October 2, 2025

LATEST NEWS

Z.AI GLM-4.6 boosts context window to 200K tokens

OpenAI releases Sora 2, iOS app with real-world inserts

Bitrig: SwiftUI apps from voice using Apple Intelligence

Bengio warns hyper-AI preservation goals threaten humanity

Apple TV 4K to feature A17 Pro chip and Apple Intelligence

Instagram tests Reels-first home tab in India

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.