A new Mirai-based botnet, dubbed the “Hail Cock Botnet,” has been exploiting vulnerabilities in IoT devices, including DigiEver DVRs and TP-Link routers, to spread malware and establish a botnet. Active since September 2024, the botnet targets devices with known vulnerabilities such as CVE-2023-1389 and leverages command injection flaws in several devices, including the DigiEver DS-2105 Pro. Researchers discovered that these devices were being targeted through a specific URI endpoint, “/cgi-bin/cgi_main.cgi,” which, when exploited, allows attackers to execute arbitrary code remotely.
The botnet uses advanced encryption techniques, including XOR and ChaCha20 algorithms, to evade detection and hinder analysis efforts. This sophisticated encryption makes the malware more difficult to investigate, allowing the attackers to extend their reach. After exploiting the vulnerabilities in these devices, the malware downloads a shell script from a remote server and executes it, establishing a communication link with the botnet’s command and control server. The malware’s ability to disguise its activities by using a harmless console message, “I just wanna look after my cats, man,” further complicates detection.
One of the major concerns highlighted by this attack is the continued exploitation of outdated IoT devices that lack security patches. Devices like the DigiEver DS-2105 Pro, which have been unsupported by the manufacturer for years, are particularly vulnerable. As manufacturers stop providing updates, these older devices become prime targets for cybercriminals. The Hail Cock Botnet is a stark reminder of the risks posed by obsolete hardware and the importance of updating or replacing vulnerable devices.
To mitigate the risks of such botnet attacks, cybersecurity experts advise users to upgrade to newer, more secure devices, particularly when manufacturers no longer offer firmware updates or patches. In addition, device administrators should be vigilant about known vulnerabilities and ensure that any exposed IoT devices are secured or taken offline to prevent compromise. The evolving tactics of botnet operators, such as using enhanced encryption and exploiting outdated devices, underscore the growing challenges in securing the IoT ecosystem.
Reference: