The operators behind the recently discovered Echobot botnet added tens of new exploits to infect a broad range of systems worldwide.

In June, experts at PaloAlto Networks uncovered a new botnet , dubbed Echobot that is based on the dreaded Mirai botnet . At the time of its discovery, operators added 8 new exploits, but a few weeks later the popular expert Larry Cashdollar from Akamai’s Security Intelligence Response Team (SIRT) discovered a variant that included a total of 26 exploits. Now the operators behind the Echobot botnet added tens of new exploits to infect a broad range of systems worldwide.

My list of the previous 26 exploits for Echobot https://t.co/YJYjC4qqdB — Larry W. Cashdollar will be at Defcon (@_larry0) August 6, 2019

Most of the exploits allow the botnet to compromise unpatched IoT devices, but experts warn that enterprise apps Oracle WebLogic and VMware SD-Wan are also potential targets.

The latest Echobot variant was spotted by security researcher Carlos Brendel Alcañiz, it includes 59 different RCE exploits to propagate.

The exploits could allow operators to target network-attached storage devices (NAS), IP cameras, IP phones, network video recorders (NVR), routers and wireless presentation systems.

Just a couple hours ago I received an exploit targeting Asus devices. Nothing interesting so far. The "richard" file is a shitty dropper, but the malware is just a bot that propagates itself using 61 different RCE exploits. I guess Richard is trying hard to get popular ^^ pic.twitter.com/xA1Tn2o3z1 — Carlos Brendel (@carbreal) August 6, 2019

Larry Cashdollar explained that even if he has yet to detect a variant of the botnet including over than 50 exploits, he is not surprised.

I haven't caught a sample yet but I'm not surprised by the additional exploit vectors. 🙂 https://t.co/2DeE7mbMD0 — Larry W. Cashdollar will be at Defcon (@_larry0) August 6, 2019

Brendell discovered the new variant after receiving weaponized code that targeted security flaws in Asus devices, he compiled an published on Pastebin a list of payloads.

“The interesting part is that the author seems to have thrown in exploits without targeting a specific category of products. The code incorporated is available from multiple public exploit repositories.” reported BleepingComputer.

“Brendel provided BleepingComputer with the exploits he found in this Echobot variant and the products they target include an odd mix of hardware and software solutions: routers, cameras, smart home hubs, network-attached storage systems, servers, database management software, Zeroshell distribution.”

The exploits used by this Echobot variant come from public repositories, below the list shared by the exp ert:

Asustor ADM 3.1.2RHG1 Remote Code Execution Ubiquity Nanostation5 (Air OS) 0day Remote Command Execution Alcatel-Lucent OmniPCX Enterprise 7.1 Remote Command Execution ASMAX AR 804 gu Web Management Console Arbitrary Command Execution ASUS DSL-N12E_C1 1.1.2.3_345 Remote Command Execution Asus RT56U 3.0.0.4.360 Remote Command Injection AWStats Totals 1.14 multisort – Remote Command Execution AWStats 6.0 ‘configdir’ Remote Command Execution AWStats 6.0 ‘migrate’ Remote Command Execution Barracuda IMG.pl Remote Command Execution Beckhoff CX9020 CPU Module Remote Code Execution Belkin Wemo UPnP Remote Code Execution BEWARD N100 H.264 VGA IP Camera M2.1.6 Remote Code Execution Crestron AM/Barco wePresent WiPG/Extron ShareLink/Teq AV IT/SHARP PN-L703WA/Optoma WPS-Pro/Blackbox HD WPS/InFocus Remote Command Injection Citrix SD-WAN Appliance 10.2.2 Authentication Bypass / Remote Command Execution EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 Remote Code Execution Dogfood CRM ‘spell.php’ Remote Command Execution CTEK SkyRouter 4200/4300 Command Execution NETGEAR R7000 / R6400 ‘cgi-bin’ Command Injection Dell KACE Systems Management Appliance (K1000) 6.4.120756 Unauthenticated Remote Code Execution D-Link OS-Command Injection via UPnP Interface OpenDreamBox 2.0.0 Plugin WebAdmin Remote Code Execution FreePBX 2.10.0 / Elastix 2.2.0 Remote Code Execution Fritz!Box Webcm Command Injection Geutebruck 5.02024 G-Cam/EFD-2250 ‘testaction.cgi’ Remote Command Execution Gitorious Remote Command Execution HomeMatic Zentrale CCU2 Remote Code Execution Hootoo HT-05 Remote Code Execution Iris ID IrisAccess ICU 7000-2 Remote Root Command Execution Linksys WAG54G2 Web Management Console Arbitrary Command Execution Mitel AWC Command Execution Nagios 3.0.6 ‘statuswml.cgi’ Arbitrary Shell Command Injection NUUO NVRmini ‘upgrade_handle.php’ Remote Command Execution NETGEAR ReadyNAS Surveillance 1.4.3-16 Remote Command Execution EyeLock nano NXT 3.5 Remote Code Execution OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 ‘welcome’ Remote Command Execution op5 7.1.9 Remote Command Execution HP OpenView Network Node Manager 7.50 Remote Command Execution Oracle Weblogic 10.3.6.0.0 / 12.1.3.0.0 Remote Code Execution PHPMoAdmin Unauthorized Remote Code Execution Plone and Zope Remote Command Execution QuickTime Streaming Server ‘parse_xml.cgi’ Remote Execution Realtek SDK Miniigd UPnP SOAP Command Execution Redmine SCM Repository 0.9.x/1.0.x Arbitrary Command Execution Rocket Servergraph Admin Center fileRequestor Remote Code Execution SAPIDO RB-1732 Remote Command Execution Seowonintech Devices Remote Command Execution Spreecommerce 0.60.1 Arbitrary Command Execution LG SuperSign EZ CMS 2.5 Remote Code Execution FLIR Thermal Camera FC-S/PT Command Injection Schneider Electric U.Motion Builder 1.3.4 ‘track_import_export.php object_id’ Unauthenticated Command Injection MiCasaVerde VeraLite Remote Code Execution VMware NSX SD-WAN Edge Command Injection WePresent WiPG-1000 Command Injection Wireless IP Camera (P2P) WIFICAM Remote Code Execution Xfinity Gateway Remote Code Execution Yealink VoIP Phone SIP-T38G Remote Command Execution ZeroShell 1.0beta11 Remote Code Execution

Pierluigi Paganini

( SecurityAffairs – Echobot variant, malware)

Share this...

Linkedin Reddit Pinterest

Share On