Monday, August 10, 17:04
Home security New strain of Mirai botnet affects Comtrend routers

New strain of Mirai botnet affects Comtrend routers

A new executive Mirai Internet of Things (IoT) botnet, can be exploited by malicious agents to attack Comtrend routers.


Mirai was first discovered in 2016 and in October of the same year, its source code was released on Internet. It has since been used as a basis for many others DDoS botnets, including SORA, UNSTABLE and Mukashi.

The new Mirai executives have new elements in terms of their goals and exploitation techniques and the new executive discovered is no exception.

According to its security researchers Trend Micro, this is its first version botnet targeting the CVE-2020-10173, a vulnerability in Comtrend VR-3033 routers.

Vulnerability could be exploited by remote invaders to "endanger the network managed by the router," explains Trend Micro.

CVE-2020-10173, however, is just one of them vulnerabilities targeting this strain. It can actually exploit nine other vulnerabilities, including one recently discovered on Netlink GPON routers.

That said error, which allows remote code execution, was discovered earlier this year, but has already been added to the Hoaxcalls botnet arsenal.

Phorpiex botnet-ransomware campaign

But in addition to these two vulnerabilities, the new Mirai variant targets a number of older security issues that have been abused by various other botnets in the past, including defects affecting the LG SuperSign EZ CMS, AVTECH devices, D-Link devices, MVPower DVR, Symantec Web Gateway and ThinkPHP.

"Using CVE-2020-10173 in the code of this variant shows how botnet developers continue to expand their arsenal to infect as many targets as possible and take advantage of the gap provided by uninformed Appliances. The recently discovered vulnerabilities offer better chances for cyber criminals. "Users who do not even know there is a vulnerability may not be able to update the device before it is too late."

The vulnerability that affects Comtrend routers is likely to be exploited by other DDoS botnets, as researchers say they tend to copy techniques with each other.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


The best security cameras to protect your home!

If you are afraid of intruders in your home, these security cameras can stream live video directly to your phone.

Do hackers carry out their attacks in real time?

More generally, there is a perception that hackers are suddenly infiltrating systems and devices and carrying out attacks. However, the reality is different. The...

Facebook: How to hide old posts

Facebook has introduced a new tool called "Activity Management" that will allow you to delete old posts, helping you to improve ...

How to download and install the Play Store on laptops and PCs?

Nowadays, many people rely on their smartphones, as they can be used easily and quickly for ...

Portable air conditioner: It is worn on the back and as a jewel 😛

Portable air conditioner - Worn on the back and like jewelry: 40 degrees and we have melted. Those of you who are lucky on the beach, please stop ...

How to download Google Camera Port 7.4 / GCam 7.4 on Xiaomi devices?

Pixel devices have Google Camera (GCam) as their default camera application. And since the Pixel series is known for ...

How to type in multiple languages ​​simultaneously on Android

People in today's world are very much addicted to smartphones. They provide access to many applications that can be used mainly ...

LucidPix: Make your photos 3D with this app!

Give a 3D format to your photos, with the LucidPix application, which is available in various versions for both Android and iPhone ...

Private or anonymous browsing: Does it guarantee your privacy on the Internet?

The term "private" is relevant, especially when it comes to private or anonymous browsing on the Internet, a setting in your web browser ...

Businesses: 8 types of cyber attacks to watch out for

Nowadays, all businesses, small and large must be on alert, as they can ...