Monday, January 18, 19:17
Home security A new Mirai Malware executive is affecting devices on the Zyxel network

A new Mirai Malware executive is affecting devices on the Zyxel network


A new version of it Mirai Malware, created by hackers, exploits the vulnerability to execute remote code (CVE-2020-9054), which was recently repaired in Appliances storage associated with the Zyxel Network (NAS).

The vulnerability has been described as "critical" and rated at 9,8 CVE. This error allows the Mukashi botnet to perform brute force attacks on logins using different combinations of default credentials.

Zyxel NAS devices running up to 5.21 firmware versions are vulnerable to exploiting this new variant of malware.

Vulnerability was originally discovered as zero day and the exploit code was put up for sale by a group of hackers, who attempted to exploit it Emotet malware.

The researchers discovered the vulnerability on March 12, 2020, when the intruder attempted to download a shell script to the tmp directory, execute the downloaded script, and remove its data from the vulnerable device.

Mukashi is also able to launch an attack DDOS on the infected machine, receiving the command from the C2 server.

How does it work;

Hackers first detect the TCP port of 23 random hosts belonging to the target network. For this purpose they use the Mukashi bot and attack brute force on logins, using default credentials. They then report the successful connection attempt to the C2 server.

After successful execution, the malware displays the message "Protect your device against further infections" on the console and locks itself on port TCP 23448 to ensure that this action is performed before proceeding with the intended operation.

Researchers recommend that users download the latest version firmware. They are also urged to set a complex password to prevent brute force attacks.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Android: How to make Signal the default messaging app

Signal is a popular encrypted messaging application that focuses on privacy. It is an alternative to ...

Google Cloud: We use some SolarWinds, but we were not affected by the hack

Google Cloud CISO Phil Venables has revealed that the cloud uses software from the vendor, SolarWinds, but states that the use ...

Scotland Environment Service: ransomware continues to affect us

The Scottish Environmental Protection Agency (SEPA) has confirmed that it was hit by a ransomware attack last month and continues to face ...

Backdoors and vulnerabilities were discovered in FiberHome routers

Backdoors and other vulnerabilities have been discovered in the firmware of a popular FiberHome FTTH ONT router. FTTH ONT stands for Fiber-to-the-Home Optical Network ...

GitHub apologizes to an employee who fired! What happened;

GitHub has admitted that it was wrong to fire a Jewish official who made "anti-Nazi" comments about the Capitol riots.

By 2030 AI will replace the people of cybersecurity

Security company Trend Micro recently conducted a new survey that reveals that more than two-fifths (41%) of IT leaders believe ...

Chinese Winnti APT targets organizations in Russia and other countries!

Security researchers at Positive Technologies have uncovered a series of attacks carried out by a Chinese APT hacking team targeting organizations in Russia ...

Silicon Valley is investing a huge amount of money in India

From March to November, even when COVID-19 destroyed economies around the world, the richest man in India ...

Microsoft, Salesforce, Oracle are designing a digital vaccination passport

A Covid digital vaccination passport is being developed jointly by a team of health and technology companies, as well as governments, airlines and ...

Google removes Chrome Sync from third-party browsers

Google says it will block the use of private Google APIs by third-party Chromium web browsers after discovering that ...