DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Alerts

Hiatus malware targets business routers

March 7, 2023
Reading Time: 2 mins read
in Alerts

 

A new sophisticated malware campaign called “Hiatus” has been discovered by Lumen Black Lotus Labs, targeting business-grade routers to covertly spy on victims in Latin America, Europe, and North America since at least July 2022.

The campaign deploys two malicious binaries: a remote access trojan called HiatusRAT and a variant of tcpdump to packet capture on the target device.

Once a system is infected, HiatusRAT allows the attacker to remotely interact with the system and turn it into a covert proxy to monitor router traffic on ports associated with email and file-transfer communications.

The threat cluster primarily singles out end-of-life (EoL) DrayTek Vigor router models 2960 and 3900, with around 100 internet-exposed devices compromised as of mid-February 2023.

Some of the impacted industry verticals include pharmaceuticals, IT services/consulting firms, and municipal government, among others. Interestingly, this represents only a small fraction of the 4,100 DrayTek 2960 and 3900 routers that are publicly accessible over the internet, suggesting that the threat actor may be intentionally maintaining a minimal footprint to limit their exposure.

Given that the impacted devices are high-bandwidth routers that can support hundreds of VPN connections, it’s suspected that the goal is to spy on targets and establish a stealthy proxy network.

The exact initial access vector used in the attacks is unknown, but a successful breach is followed by the deployment of a bash script that downloads and executes HiatusRAT and a packet-capture binary.

HiatusRAT is feature-rich and can harvest router information, running processes, and contact a remote server to fetch files or run arbitrary commands. It’s also capable of proxying command-and-control (C2) traffic through the router.

The use of compromised routers as proxy infrastructure is likely an attempt to obfuscate the C2 operations, according to researchers. The findings come more than six months after Lumen Black Lotus Labs also shed light on another router-focused malware campaign that used a novel trojan called ZuoRAT.

Mark Dehus, director of threat intelligence for Lumen Black Lotus Labs, said, “The discovery of Hiatus confirms that actors are continuing to pursue router exploitation.

These campaigns demonstrate the need to secure the router ecosystem, and routers should be regularly monitored, rebooted, and updated, while end-of-life devices should be replaced.”

Read More

Tags: AlertsAlerts 2023EuropeHiatusLatin AmericaMalware CampaignMarch 2023North AmericaRATRemote Access TrojansRouters
0
VIEWS
ADVERTISEMENT

Related Posts

OpenAI fixes vulnerabilities in ChatGPT

OpenAI fixes vulnerabilities in ChatGPT

March 30, 2023
Vendors Alert 3CX Supply Chain Attack

Vendors Alert 3CX Supply Chain Attack

March 30, 2023
Mozilla Fixes Thunderbird Vulnerability

Mozilla Fixes Thunderbird Vulnerability

March 30, 2023
Chinese state hackers target Linux servers

Chinese state hackers target Linux servers

March 30, 2023

More Articles

Alerts

CISA Adds 15 Known Exploited Vulnerabilities

February 11, 2022
Incidents

School’s out as cyberattack forces APS to cancel classes

January 13, 2022
Incidents

Telus hit by potential data breach: employee info and Github code for sale on dark web

February 24, 2023
Alerts

Google Releases Security Updates for Chrome

October 1, 2021

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.