securityboulevard.com Open in urlscan Pro
2606:4700:10::6816:29c  Public Scan

URL: https://securityboulevard.com/2022/04/new-botenago-variant-discovered-by-nozomi-networks-labs/?web_view=true
Submission: On April 19 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://securityboulevard.com/

<form action="https://securityboulevard.com/" class="search-form searchform clearfix" method="get">
  <div class="search-wrap">
    <input type="text" placeholder="Search" class="s field" name="s">
    <button class="search-icon" type="submit"></button>
  </div>
</form>

POST /2022/04/new-botenago-variant-discovered-by-nozomi-networks-labs/?web_view=true

<form method="post" enctype="multipart/form-data" id="gform_10" action="/2022/04/new-botenago-variant-discovered-by-nozomi-networks-labs/?web_view=true">
  <div class="gform_body gform-body">
    <ul id="gform_fields_10" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_10_1" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_10_1"><label class="gfield_label" for="input_10_1">Email<span
            class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_1" id="input_10_1" type="text" value="" class="large" placeholder="Your Email" aria-required="true" aria-invalid="false">
        </div>
      </li>
      <li id="field_10_2" class="gfield gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_10_2">
        <div class="gsection_description"><a href="https://securityboulevard.com/privacy-policy/">View Security Boulevard <u>Privacy Policy</u></a></div>
      </li>
      <li id="field_10_3" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_10_3">
        <div class="ginput_container ginput_container_text"><input name="input_3" id="input_10_3" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_10_4" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_10_4">
        <div class="ginput_container ginput_container_text"><input name="input_4" id="input_10_4" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_10_5" class="gfield gfield--width-full field_sublabel_below field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_10_5"><label class="gfield_label" for="input_10_5">CAPTCHA</label>
        <div id="input_10_5" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6Ld9rm8cAAAAAEa1mXDqRlCvlsP8t1u1weqyOCJn" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Ld9rm8cAAAAAEa1mXDqRlCvlsP8t1u1weqyOCJn&amp;co=aHR0cHM6Ly9zZWN1cml0eWJvdWxldmFyZC5jb206NDQz&amp;hl=en&amp;v=6pQzWaE1NP-gB4FrqRViKjM-&amp;theme=light&amp;size=invisible&amp;badge=bottomright&amp;cb=y54k8tqawek9"
                width="256" height="60" role="presentation" name="a-qq5z46rvxdr7" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
                tabindex="-1"></iframe></div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </li>
      <li id="field_10_6" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_10_6"><label class="gfield_label" for="input_10_6">Phone</label>
        <div class="ginput_container"><input name="input_6" id="input_10_6" type="text" value=""></div>
        <div class="gfield_description" id="gfield_description_10_6">This field is for validation purposes and should be left unchanged.</div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_10" class="gform_button button" value="Subscribe Now"
      onclick="if (!window.__cfRLUnblockHandlers) return false; if(window[&quot;gf_submitting_10&quot;]){return false;}  window[&quot;gf_submitting_10&quot;]=true;  "
      onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_10&quot;]){return false;} window[&quot;gf_submitting_10&quot;]=true;  jQuery(&quot;#gform_10&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" class="gform_hidden" name="is_submit_10" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="10">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_10" value="WyJbXSIsImExN2ZmNzMxNzRmOWUyZjU4NDM0NzI5MzVhYzMzZjI2Il0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_10" id="gform_target_page_number_10" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_10" id="gform_source_page_number_10" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1650363208249"></p>
</form>

Text Content

Tuesday, April 19, 2022
 * Local U.S. Governments and Municipalities at Risk of Foreign Nation Cyber
   Attacks
 * How to Mitigate Client-side Supply Chain Threats
 * We have entered the era of crafted malware
 * Regulatory Compliance – Holding Security Back or Forcing us to Reassess old
   biases?
 * Explosion of Machine Identities Creating Cybersecurity ‘Debt’

 * 
 * 
 * 
 * 
 * 
 * 
 * 


SECURITY BOULEVARD

The Home of the Security Bloggers Network


Community Chats Webinars Library


 * Home
   * Cybersecurity News
   * Features
   * Industry Spotlight
   * News Releases
 * Security Bloggers Network
   * Latest Posts
   * Contributors
   * Syndicate Your Blog
   * Write for Security Boulevard
 * Events
   * Upcoming Events
   * Upcoming Webinars
   * On-Demand Events
   * On-Demand Webinars
 * Chat
   * Security Boulevard Chat
   * Marketing InSecurity Podcast
 * Library
 * Related Sites
   * Techstrong Group
   * Container Journal
   * DevOps.com
   * Security Boulevard
   * Techstrong Research
   * Techstrong TV
   * Devops Chat
   * DevOps Dozen
   * DevOps TV
   * Digital Anarchist
 * Media Kit
 * About Us



 * Analytics
 * AppSec
 * CISO
 * Cloud
 * DevOps
 * GRC
 * Identity
 * Incident Response
 * IoT / ICS
 * Threats / Breaches
 * More
   * Blockchain / Digital Currencies
   * Careers
   * Cyberlaw
   * Mobile
   * Social Engineering
 * Humor


TwitterLinkedInFacebookRedditEmailShare
IoT & ICS Security Malware Security Bloggers Network 

Home » Cybersecurity » IoT & ICS Security » New BotenaGo Variant Discovered by
Nozomi Networks Labs


NEW BOTENAGO VARIANT DISCOVERED BY NOZOMI NETWORKS LABS

by Nozomi Networks Labs on April 18, 2022

According to AT&T Alien Labs, BotenaGo malware has been deployed with over 30
exploit functions, putting millions of IoT devices at risk of potential
cyberattacks. BotenaGo is written in “Go”, which is a Google open-source
programming language. While the use of open-source programming languages has its
benefits, attackers have equally taken advantage, using Go to code malicious
malware.

Our research highlights Nozomi Networks Labs’ discovery of a new variant of the
BotenaGo malware that specifically targets Lilin security camera DVR devices. We
have named this sample “Lillin scanner” because of the name the developers used
for it in the source code: /root/lillin.go. Let’s dive deeper into the
functionality of this sample to show step-by-step how these kinds of scanners
work.



Figure 1. BotenaGo source code.

The source code of the BotenaGo malware (Figure 1) was leaked in October 2021,
which led to the creation of new variants based on the original. We decided to
monitor samples that could have been generated utilizing parts of the BotenaGo
source code. In doing so, we discovered a sample that contained certain
similarities of BotenaGo.

At the time of this research, the sample had not been detected by any malware
detection engine in VirusTotal (Figure 2). Although the sample is quite large
(2.8 MB), due to being written in Go, the portion of the actual malicious code
is quite small and focuses on a single task. Its authors removed almost all of
the the 30+ exploits present in BotenaGo’s original source code and reused some
parts to exploit a different vulnerability that was over two years old. This may
be why the sample hasn’t been detected until now.



Figure 2. The file is not detected as a threat.




LILLIN SCANNER FUNCTIONALITY

In order to run, the scanner/exploiter needs a parameter to be passed in the
command line. That will be the port being used to connect to each of the IP
addresses that the program targets. Lillin scanner differs from BotenaGo in that
it doesn’t check the banner for the given IPs. It is possible that this tool is
chained with another program that builds lists of Lilin devices using services
like Shodan or other mass scanning tools.

Next, the sample will iterate over the IP addresses that it receives from the
standard input. This portion of the code can easily be spotted in the original
BotenaGo source code. These instructions will create one Goroutine (a sort of
thread used in Go) per IP address executing the infectFunctionLilinDvr function,
which follows the same naming convention as in BotenaGo.



Figure 3. A loop creating Goroutines using the input from STDIN.



The presence of strings with the names of the functions and the absence of any
protection (many malware families use at least the modified version of UPX)
means that it isn’t actually trying to protect itself against security products
and reverse engineers. It reinforces the theory that this executable might
mainly be intended to be used by attackers in manual mode.


DEVICE ACCESS AND VULNERABILITY EXPLOITATION

When the infectFunctionLilinDvr function receives the IP address to scan, it
first checks if the device behind that IP can be accessed. The Lillin scanner
contains 11 pairs of user-password credentials in its code. This is a difference
from previous malware samples that, reportedly, abused only the credentials
root/icatch99 and report/8Jg0SR8K50. These credentials are Base64-encoded to be
used in the basic authentication needed to exploit the vulnerability that allows
the Remote Code Execution (RCE).



Figure 4. Credentials used for bruteforce access to the DVRs.





Figure 5. Basic authentication attempt.



Lillin scanner will loop over the 11 encoded credentials and will sequentially
try to access the root directory, changing the Base64 string in the
Authorization field. When the server response contains the string HTTP/1.1 200
or HTTP/1.0 200 it will consider the authentication to be successful and will
attempt the exploitation of the Network Time Protocol (NTP) configuration
vulnerability.

This vulnerability, part of a set of security vulnerabilities affecting Lilin
DVRs, was discovered in 2020 and was assigned a CVSS v3.1 score of 10.0
(Critical) by the vendor.

The scanner will send particularly crafted HTTP POST requests to the URL paths
/dvr/cmd and /cn/cmd in order to exploit a command injection vulnerability in
the web interface.

First, the scanner attempts to inject some code by submitting a POST request to
the URL path /dvr/cmd. If successful, this request then modifies the NTP
configuration of the camera. The modified configuration contains a command that,
because of the vulnerability, will attempt to download a file named wget.sh from
the IP address 136.144.41[.]169 and then immediately execute its content. If the
command injection to /dvr/cmd is not successful, the scanner attempts the same
attack to the endpoint /cn/cmd.

Once the attack is complete, another request to the same endpoint restores the
original NTP configuration.



Figure 6. POST request with the injected wget command.



The file wget.sh recursively downloads multiple executables for multiple
architectures from 136.144.41[.]169. The targeted architectures are ARM,
Motorola 68000, MIPS, PowerPC, SPARC, SuperH, x86.



Figure 7. The content of wget.sh file.




THE MIRAI MALWARE FAMILY

In the third stage of this attack, multiple malicious samples for each
architecture attempt to execute on the camera. These samples belong to the Mirai
malware family, which is a widely known threat to IoT devices. All these samples
have recently been submitted to VirusTotal (at the beginning of March 2022). For
example, for the MIPS architecture, two samples have been identified as the
third stage connected to the Mirai family:

 * ae0185189e463c6abddf8865972dac72630b6e515e79d3f7566f0983a0eae295
 * 28f50f24c930b595f88257748f62d985436ecce1330ff52f09cdd13642591450



Figure 8. TVirusTotal graph showing the connection between the two ELF samples
and wget request contained in the wget.sh file.



For x86 architecture, the file
62ef086111b6816d332e298d00ac946c11fac0ed8708fa2668ad3c91ceb96dbf is downloaded
and executed. An analysis of this sample reveals some typical behaviors of the
Mirai malware. For example, while scanning new devices, Mirai typically
bruteforces the authentication using a list of hardcoded credentials. In Figure
9, there is a non-exhaustive list of credentials used for the bruteforce. This
list comes from the Mirai source code.



Figure 9. Non-exhaustive list of hardcoded credentials used by Mirai malware
from the source code.

From the static analysis of the downloaded sample, we retrieved a list of
credentials used in the scanning module, many of which are the same as the ones
hardcoded in the Mirai source code.



Figure 10. A portion of code from sample
62ef086111b6816d332e298d00ac946c11fac0ed8708fa2668ad3c91ceb96dbf using the same
credentials hardcoded in the source code.



Another behavior associated with the Mirai botnet is the exclusion of IP ranges
belonging to the internal networks of the U.S. Department of Defense (DoD), U.S.
Postal Service (USPS), General Electric (GE), Hewlett-Packard (HP), and others.
Some of them are visible in Figure 11, which is taken from Mirai’s source code.



Figure 11. Some of the IP ranges listed in the source code that are excluded
while scanning.



The same IP ranges are excluded from the scanning procedure in the sample we are
analyzing. Moreover, we see that the verification of a randomly generated IP
follows the same algorithm as the one implemented in Mirai’s source code.



Figure 12. Portion of the sample code excluding some IP ranges while generating
the IPs to scan.



It seems that this tool has been quickly built using the code base of the
BotenaGo malware. It shouldn’t be confused with a worm as its main goal is to
infect its victims with Mirai executables with a list of IP addresses provided
as input; it can’t automatically propagate itself.


CONCLUSION

Apart from working on completely new projects, attackers also commonly re-use
already available code to build new malware. Monitoring the evolution of these
projects helps create more robust and generic detections that remain proactive
for a longer time, thus providing better protections against modern
cyberthreats.





Related Content







WHITE PAPER


THE S3CUREC4M PROJECT: VULNERABILITY RESEARCH IN MODERN IP VIDEO SURVEILLANCE
TECHNOLOGIES

Learn how to assess the security posture of an IP video surveillance system,
including hardware extraction and firmware analysis techniques.

Download





Related Links




 * Blog: How IoT Botnets Evade Detection and Analysis
 * Blog: Critical Log4Shell (Apache Log4j) Zero-Day Attack Analysis
 * Blog: Reverse Engineering Obfuscated Firmware for Vulnerability Analysis
 * Blog: Methods for Extracting Firmware from OT Devices for Vulnerability
   Research
 * On-Demand Webinar: OT/IoT Security Review 2021 2H: Lessons for Critical
   Infrastructure







The post New BotenaGo Variant Discovered by Nozomi Networks Labs appeared first
on Nozomi Networks.

*** This is a Security Bloggers Network syndicated blog from Nozomi Networks
authored by Nozomi Networks Labs. Read the original post at:
https://www.nozominetworks.com/blog/new-botenago-variant-discovered-by-nozomi-networks-labs/

April 18, 2022April 18, 2022 Nozomi Networks Labs 0 Comments All, Blog, iot,
Labs, Labs Blogs, Malware, Nozomi Networks Labs

 * ← What are Active Directory FSMO roles and How do they Work
 * The Frozen Heart vulnerability in PlonK →






TECHSTRONG TV – LIVE

Click full-screen to enable volume control
Watch latest episodes and shows


SUBSCRIBE TO OUR NEWSLETTERS

Get breaking news, free eBooks and upcoming events delivered to your inbox.
 * Email*
   
 * View Security Boulevard Privacy Policy
 * 
 * 
 * CAPTCHA
   
 * Phone
   
   This field is for validation purposes and should be left unchanged.



Δ


MOST READ ON THE BOULEVARD

Attack on Panasonic Canada Shows Conti is Still Dangerous
Software Supply Chain Attacks: Clear and Present Danger
Gov’t Advisory Warns of Pipedream Malware Aimed at ICS
Palo Alto Networks Report Reveals Cloud Security Challenges
Understanding SASE and Zero-Trust to Strengthen Security
New BotenaGo Variant Discovered by Nozomi Networks Labs
10 Ways to Implement AppSec Measures for Your Cloud Ecosystem
1,701 New Vulnerabilities: Vulnerability Intelligence Infographic, March 2022:
Key Trends and Analysis
PHP Web Application Security – How to protect your WordPress website
This Week in Malware – Special Edition on Protestware and a Struts RCE Deja Vu


UPCOMING WEBINARS

Tue 19


USING DEVSECOPS FOR CONTINUOUS COMPLIANCE AND SECURITY AUTOMATION

April 19 @ 11:00 am - 12:00 pm
Thu 21


GETTING HASHICORP TERRAFORM INTO PRODUCTION

April 21 @ 1:00 pm - 2:00 pm
Mon 25


SURVEYING THE APPSEC LANDSCAPE

April 25 @ 1:00 pm - 2:00 pm
Tue 26


SHIFT LEFT: BALANCING DEVOPS AND INFRASTRUCTURE SECURITY

April 26 @ 11:00 am - 12:00 pm
Tue 26


RANSOMWARE INVESTIGATION: THE COMPLETE DEMO

April 26 @ 3:00 pm - 4:00 pm

More Webinars


DOWNLOAD FREE EBOOK





INDUSTRY SPOTLIGHT

Cybersecurity Endpoint Industry Spotlight IoT & ICS Security Security Boulevard
(Original) Vulnerabilities 


ESTABLISHING A ROOT OF TRUST IN EMBEDDED LINUX AND IOT

April 18, 2022 Anita Buehrle | Yesterday 0 Comments
Cybersecurity Data Security Identity & Access Industry Spotlight Network
Security Security Boulevard (Original) 


ATTORNEY-CLIENT PRIVILEGE AND EMAIL PRIVACY

April 7, 2022 Mark Rasch | Apr 07 0 Comments
Cybersecurity Endpoint Industry Spotlight Network Security Security
Awareness Security Boulevard (Original) 


HOW MSPS CAN FILL THE CYBERSECURITY SKILLS GAP

February 17, 2022 Mike Adler | Feb 17 Comments Off on How MSPs can Fill the
Cybersecurity Skills Gap


TOP STORIES

Cybersecurity Endpoint Featured Governance, Risk & Compliance IoT & ICS
Security Malware News Security Awareness Security Boulevard
(Original) Spotlight Threat Intelligence 


GOV’T ADVISORY WARNS OF PIPEDREAM MALWARE AIMED AT ICS

April 15, 2022 Teri Robinson | 3 days ago 0 Comments
Cybersecurity Data Security Featured Incident Response Malware News Security
Boulevard (Original) Spotlight Threat Intelligence 


ATTACK ON PANASONIC CANADA SHOWS CONTI IS STILL DANGEROUS

April 15, 2022 Teri Robinson | 3 days ago 0 Comments
Cloud Security Cybersecurity Featured Identity & Access News Security Boulevard
(Original) Spotlight Threat Intelligence Vulnerabilities 


PALO ALTO NETWORKS REPORT REVEALS CLOUD SECURITY CHALLENGES

April 14, 2022 Michael Vizard | 4 days ago 0 Comments


SECURITY HUMOR

ROBERT M. LEE’S & JEFF HAAS’ LITTLE BOBBY COMIC – ‘WEEK 377’






JOIN THE COMMUNITY

 * Add your blog to Security Bloggers Network
 * Write for Security Boulevard
 * Bloggers Meetup and Awards
 * Ask a Question
 * Email: info@securityboulevard.com


USEFUL LINKS

 * About
 * Media Kit
 * Sponsors Info
 * Copyright
 * TOS
 * DMCA Compliance Statement
 * Privacy Policy


RELATED SITES

 * Techstrong Group
 * Container Journal
 * DevOps.com
 * Techstrong Research
 * Techstrong TV
 * DevOps Chat
 * DevOps Dozen
 * DevOps TV
 * Digital Anarchist

 * 
 * 
 * 
 * 
 * 
 * 
 * 


Copyright © 2022 Techstrong Group Inc. All rights reserved.


✓
Thanks for sharing!
AddToAny
More…


Notifications





previousnextslideshow