The new variant of the P2PInfect botnet, which is now targeting routers and IoT devices, marks a significant expansion in the capabilities of this emerging malware. This variant has been specifically designed to run on Linux devices that utilize MIPS (Microprocessor without Interlocked Pipelined Stages) processors. By targeting devices running on MIPS architecture, the P2PInfect botnet demonstrates a strategic shift and a broadening of its target scope.
The shift to targeting MIPS-based IoT devices suggests that the operators behind P2PInfect are experienced threat actors who are actively expanding their list of targets. This expansion poses a heightened risk, potentially paving the way for widespread infections across a range of devices that use the MIPS architecture. Initially, P2PInfect exploited Redis database systems for entry into networks; however, this new focus on MIPS architecture indicates a strategic evolution in the malware's approach.
This development underscores the growing sophistication of botnet operators and the need for increased security measures, especially in devices with IoT capabilities and routers, which are becoming more prevalent in various sectors. The ability of such malware to adapt and target specific architectures like MIPS further highlights the importance of maintaining robust cybersecurity practices to protect against such evolving threats.
IoC
SHA256
- d75d2c560126080f138b9c78ac1038ff2e7147d156d1728541501bc801b6662f
- 8b704d6334e59475a578d627ae4bcb9c1d6987635089790350c92eafc28f5a6c
CVE
- CVE-2022-0543
REFERENCES
- https://thehackernews.com/2023/12/new-p2pinfect-botnet-mips-variant.html#:~:text=New%20P2PInfect%20Botnet%20MIPS%20Variant,targeting%20routers%20and%20IoT%20devices
- https://www.csoonline.com/article/1251159/p2pinfect-redis-worm-targets-iot-with-version-for-mips-devices.html#:~:text=Researchers%20have%20recently%20come%20across,by%20targeting%20MIPS%2C%20the%20P2Pinfect
- https://otx.alienvault.com/pulse/656de905fbaae54097494837
TAGS
p2pinfect, mips, linux, rust, redis module, stages, mirai,iot
No comments:
Post a Comment