Wednesday, April 8, 23:42
Home security A new Mirai Malware executive is affecting devices on the Zyxel network

A new Mirai Malware executive is affecting devices on the Zyxel network


A new version of it Mirai Malware, created by hackers, exploits the vulnerability to execute remote code (CVE-2020-9054), which was recently repaired in Appliances storage associated with the Zyxel Network (NAS).

The vulnerability has been described as "critical" and rated at 9,8 CVE. This error allows the Mukashi botnet to perform brute force attacks on logins using different combinations of default credentials.

Zyxel NAS devices running up to 5.21 firmware versions are vulnerable to exploiting this new variant of malware.

Vulnerability was originally discovered as zero day and the exploit code was put up for sale by a group of hackers, who attempted to exploit it Emotet malware.

The researchers discovered the vulnerability on March 12, 2020, when the intruder attempted to download a shell script to the tmp directory, execute the downloaded script, and remove its data from the vulnerable device.

Mukashi is also able to launch an attack DDOS on the infected machine, receiving the command from the C2 server.

How does it work;

- Advertisement -

Hackers first detect the TCP port of 23 random hosts belonging to the target network. For this purpose they use the Mukashi bot and attack brute force on logins, using default credentials. They then report the successful connection attempt to the C2 server.

After successful execution, the malware displays the message "Protect your device against further infections" on the console and commits to TCP port 23448 to ensure that this action is performed before proceeding to the intended function.

Researchers recommend that users download the latest version firmware. They are also urged to set a complex password to prevent brute force attacks.

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Please enter your comment!
Please enter your name here


OTEAcademy: Telecommunication Program for Scientists & Freelancers, affected by COVID-19

OTEAcademy participates in the special telecommunication program - certification for scientists and freelancers affected by COVID-19.

Facebook wanted to buy Pegasus Spyware to track Apple users

According to NSO CEO Shalev Hulio, Facebook tried to buy ...

7 apps to watch movies online at the same time as your friends

According to the recommendations made by governments and health organizations around the world, ...

Tesla's model uses solar energy to move

The designs for a Tesla Roadster, with an engine that uses solar energy, were recently released on the internet and ...

George Soros is pushing for a postal vote due to COVID-19

George Soros pushes for postal voting due to COVID-19: For the purposes of the vote, George Soros-funded Brennan Center ...

Sony: Reveals the new DualSense controller for the PS5!

Together with the fifth model Playstation, PS5, Sony has unveiled the new DualSense space controller, which retains some of the ...

Koronoios: Fraudsters sell blood and saliva from a survivor on the Dark Web

The ad on Own Shop, a store on the Dark Web, claims that someone has been infected with coronavirus and is now selling ...

UbuntuDDE: Ubuntu Linux with Deepin desktop

UbuntuDDE: Ubuntu Linux with Deepin desktop- Have you ever wondered what would happen if you combined the powers ...

Facebook: Launches new chat application for couples due to COVID-19!

As the governments of a large number of countries have taken measures of social distancing and lockdown, in an effort to limit ...

Netflix: Lock your PIN account for more security

Netflix: Lock your PIN account for more security - Netflix, one of the best known ...