Published on April 20th, 2020 📆 | 2656 Views ⚑
0IoT Botnet Assembled by New Mozi Malware Family
Last week in security news, researchers revealed that a new malware family called Mozi is in the process of building an internet of things (IoT) botnet. Mozi wasnât the only digital threat that made its first appearance in news headlines that week. Speculoos backdoor also gained some attention for a new attack campaign perpetrated by the APT41 threat actor.
Top Story of the Week: Moziâs IoT Bots
In December 2019, Black Lotus Labs at CenturyLink noticed that the security firmâs reputation systems had registered an increase in activity involving the otherwise static IoT Reaper malware family. The research team decided to investigate further. This effort revealed that IoT Reaper had nothing to do with the attack and that the activity actually involved a new malware family whose compromised hosts contained references to files with âMoziâ in their names.
Black Lotus Labs ultimately learned that CenturyLinkâs reputation systems had mislabeled the activity because Mozi had evolved from the source code of IoT Reaper, Gafgyt and Mirai. It used this code to begin building a P2P botnet of its own by targeting routers, DVRs and other IoT devices that were either unpatched or unprotected by strong credentials.
Source: iStock
Also in Security News
- TA505 Targeted Networks With SDBbot RAT: IBM X-Force revealed that it spotted a campaign in which the threat actor Hive0065, otherwise known as TA505, leveraged spear phishing emails impersonating Onehub to target enterprise employees in Europe. Those emails sought to steal usersâ credentials and infect their machines with the SDBbot remote-access Trojan (RAT).
- New York State Confirmed Intrusion Against Government Network: As reported by The Wall Street Journal, New Yorkâs Office of Information Technology Services discovered a breach in late January in which attackers had constructed tunnels into servers used for relaying sensitive data. The state responded by hiring outside security services and working with the FBI to investigate the incident.
- Speculoos Backdoor Distributed by Campaign Exploiting CVE-2019-19781: In an attack spotted by Palo Alto Networksâ Unit 42, malicious actors targeted various organizations in North America, South America and Europe with a campaign that exploited CVE-2019-19781. This flaw granted attackers the capability of executing remote code for the purpose of installing Speculoos.
- AZORult, NanoCore RAT Delivered by FreeDom Loader: Zscaler observed that the attack campaign began with malspam messages carrying PowerPoint files. These attachments relied on macros to download an encoded VBScript from Pastebin, a script that then used PowerShell to spawn FreeDom loader for the purpose of installing AZORult or NanoCore RAT.
- WebEx Users Targeted With Spoofed IT Security Alerts: Per Cofense, this attack campaign sought to target WebEx users by sending out messages from an address designed to look like âmeetings[@]webex[.]com.â Those messages attempted to trick recipients into visiting a phishing landing page designed to steal their WebEx credentials.
- Nemty Ransomwareâs Operators Announced End of RaaS Program: ZDNet learned that the operators of Nemty ransomware had announced on the dark web that they would be shutting down their creationâs ransomware-as-a-service (RaaS) platform. Shortly after that announcement, these malicious actors also closed the portal used by Nemty to leak its victimsâ data.
Security Tip of the Week: Secure Your IoT Devices
Security professionals can help defend their organizations against malware such as Mozi by improving the authentication measures on their IoT devices. Specifically, they should enable two-factor authentication where itâs available and implement strong passwords on all of their corporate assets. Infosec personnel also need to invest in their ability to passively discover all of their IoT devices so that they can locate and remediate vulnerabilities and other security risks on a timely basis.
Gloss