• New HiatusRAT Router Malware Covertly Spies On Victims

    Home » Forums » Cyber Security Information and Advisories » Code Red – Security/Privacy advisories » New HiatusRAT Router Malware Covertly Spies On Victims

    Author
    Topic
    #2543333

    https://blog.lumen.com/new-hiatusrat-router-malware-covertly-spies-on-victims/

    Executive Summary

    Just nine months after discovering ZuoRAT – a novel malware targeting small office/home office (SOHO) routers – Lumen Black Lotus Labs® identified another, never-before-seen campaign involving compromised routers. This is a complex campaign we are calling “Hiatus”. It infects business-grade routers and deploys two malicious binaries, including a Remote Access Trojan (RAT) we’re calling HiatusRAT, and a variant of tcpdump that enables packet capture on the target device.

    Once a targeted system is infected, HiatusRAT allows the threat actor to remotely interact with the system, and it utilizes prebuilt functionality – some of which is highly unusual – to convert the compromised machine into a covert proxy for the threat actor. The packet-capture binary enables the actor to monitor router traffic on ports associated with email and file-transfer communications…

    As of mid-February 2023, there were approximately 2,700 DrayTek Vigor 2960 routers and approximately 1,400 DrayTek Vigor 3900 routers exposed on the internet, and Hiatus had compromised approximately 100 of these routers. This campaign is significantly smaller than some of the more prominent botnets such as Emotet or Chaos – both of which indiscriminately target vulnerable devices on the internet. We assess that the threat actor most likely chose to keep the campaign small to evade detection…

    • This topic was modified 1 week, 6 days ago by Alex5723.
    1 user thanked author for this post.
    Reply To: New HiatusRAT Router Malware Covertly Spies On Victims

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: