www.fortinet.com
Open in
urlscan Pro
2a05:d014:f3c:6c01:8589:ad97:29df:f3e
Public Scan
URL:
https://www.fortinet.com/blog/threat-research/new-goldoon-botnet-targeting-d-link-devices
Submission: On May 06 via api from DE — Scanned from DE
Submission: On May 06 via api from DE — Scanned from DE
Form analysis
1 forms found in the DOMGET /blog/search
<form class="b3-searchbox__form" action="/blog/search" method="get">
<input class="b3-searchbox__input" type="text" name="q" placeholder="Search Blogs">
<button class="b3-searchbox__icon" aria-label="Search" type="submit">
<svg viewBox="0 0 16 16" xmlns="http://www.w3.org/2000/svg">
<path
d="M15.688 14.18l-4.075-4.075C12.36 9.06 12.8 7.78 12.8 6.4 12.8 2.87 9.93 0 6.4 0 2.87 0 0 2.87 0 6.4c0 3.53 2.87 6.4 6.4 6.4 1.38 0 2.66-.44 3.705-1.187l4.075 4.075c.207.208.48.312.753.312.274 0 .547-.104.755-.312.416-.417.416-1.093 0-1.51zM2.133 6.4c0-2.357 1.91-4.267 4.267-4.267s4.267 1.91 4.267 4.267-1.91 4.267-4.267 4.267S2.133 8.757 2.133 6.4z"
fill="#fff">
</path>
</svg>
</button>
</form>
Text Content
Blog * Categories * Business & Technology * FortiGuard Labs Threat Research * Industry Trends * Partners * Customer Stories * PSIRT Blogs * Business & Technology * FortiGuard Labs Threat Research * Industry Trends * Partners * Customer Stories * PSIRT Blogs * CISO Collective * Subscribe FortiGuard Labs Threat Research NEW “GOLDOON” BOTNET TARGETING D-LINK DEVICES By Cara Lin and Vincent Li | May 01, 2024 * Article Contents * Dropper * Downloader * Goldoon Autorun MethodsC2 Connection and Behavior Attack Methods * Conclusion Fortinet Protections * IOCs C2 Files By Cara Lin and Vincent Li | May 01, 2024 Affected Platforms: D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier Impacted Users: Any organization Impact: Remote attackers gain control of the vulnerable systems Severity Level: High In April, FortiGuard Labs observed a new botnet targeting a D-Link vulnerability from nearly a decade ago, CVE-2015-2051. This vulnerability allows remote attackers to execute arbitrary commands via a GetDeviceSettings action on the HNAP interface. As a result, an attacker can create a crafted HTTP request with a malicious command embedded in the header. Our IPS signature captured attempts to exploit the CVE-2015-2051 vulnerability to propagate a new botnet that we have named “Goldoon.” Figure 1 shows the attack packet. If a targeted device is compromised, attackers can gain complete control, enabling them to extract system information, establish communication with a C2 server, and then use these devices to launch further attacks, such as distributed denial-of-service (DDoS). Our telemetry data also indicates that this botnet activity spiked in April, almost doubling the usual frequency. In this article, we will provide detailed insights into the propagation and actions of the Goldoon botnet. Figure 1: CVE-2015-2051 payload Figure 2: IPS signature telemetry DROPPER The attackers initially exploit CVE-2015-2051 to download a file “dropper” from “hxxp://94[.]228[.]168[.]60:8080.” The script is programmed to automatically download, execute, and clean up potentially malicious files across various Linux system architectures, including aarch64, arm, i686, m68k, mips64, mipsel, powerpc, s390x, sparc64, x86-64, sh4, riscv64, DEC Alpha, and PA-RISC. Each downloaded file, named “goldoon,” is executed immediately after its download and permission adjustment. After execution, the script removes the executed file and then deletes itself to erase any trace of its activity, thereby enhancing its stealth. Figure 3: Script file "dropper" DOWNLOADER The primary role of the “i686-linux-gnu” downloaded from the dropper is to get the botnet file. It first employs the XOR key, “YesItsAnAntiHoneypotBaby,” to decrypt the specific strings “linux” and “i686-linux-gnu.” After decoding, it attaches them to “/bins” to construct the full Uniform Resource Identifier (URI). It uses a fixed header, “User-Agent: FBI-Agent (Checking You),” to get the ultimate payload. Figure 4: XOR function and key for decoding URI Figure 5: Hard-coded header Figure 6: Packet capture for downloading Goldoon Any attempt to open the targeted URI using a web browser will lead to the error message shown in Figure 7. Figure 7: Error message Finally, it iterates through a set of paths, modifying each file it can write to and then deleting those files after modification. This is another cleanup mechanism to cover its tracks in a compromised system. Figure 8: Erase trace GOLDOON Through analyzing the malware, we found that it has the following behaviors: * Initializes required arguments * Sets autorun to persist in the victim device * Establishes a persistent connection with its Command and Control (aka, C2) server * Waits for commands from the C2 server to launch related behaviors Goldoon first initializes some required arguments for establishing a connection. For example, it uses “WolfSSL” for traffic encryption and sets the Google DNS server (i.e., “8.8.8.8”, “8.8.4.4”) as a DNS resolver. This allows the malware to carry through its attack. Figure 9: Initialize DNS Server AUTORUN METHODS There are ten different autorun methods, each aiming to execute malware while the victim’s computer is starting up. We can classify them into the following types: Boot Execution, Daemon, and Logon Execution. The malware can execute itself through Linux booting initialize files or applications, such as “/etc/rc.local,” “crontab,” etc. Figure 10: Boot Execution with Crontab Otherwise, it can be created as a daemon named “goldoon.server” and later enable itself to persist in the victim’s computer. Figure 11: Daemon by the Name of "goldoon.server" In addition, the malware can also execute automatically as soon as the victim logs on to the compromised device. Autorun Type Autorun Method Boot Execution /etc/rc.local /etc/init.d/startup_script /etc/init.d/S99startup crontab /etc/profile Daemon /etc/systemd/system/goldoon.service /etc/inittab Logon Execution ~/.bashrc ~/.config/autostart/goldoon.desktop /etc/xdg/autostart/goldoon.desktop Table 1: Autorun Method C2 CONNECTION AND BEHAVIOR The Goldoon malware continuously tries to connect to its C2 server until a connection is established. It also records information about the targeted system, such as user name, etc. Figure 12: C2 Connecting Stage Figure 13: Get Victim System Information Once completed, the Goldoon malware receives packets from the C2 server. These contain commands for follow-up actions. Figure 14: Reading and Handling Packet The packet has seven cases that are set off by the C2 server. Two of them have obviously malicious purposes. One executes commands through “/bin/bash -c” on the victim host, and the other triggers different DoS attacks. Figure 15: Command Execution ATTACK METHODS According to our analysis, this malware contains an astounding 27 different methods related to various attacks. Protocol Attack Method ICMP ICMP Flooding TCP TCP Flooding, XMAS Attack, etc. UDP UDP Flooding DNS DNS Flooding HTTP HTTP Bypass, HTTP Flooding, etc. Other Minecraft DDoS Attack Table 2: Attack Methods Take a TCP SYN flooding attack as an example. The malware first gathers information about the target, such as its IP and port, and even checks whether the target IP is IPv6. Figure 16: TCP SYN Flooding Attack Arguments Goldoon can launch DoS attacks through common protocols, including the game Minecraft. The malware uses various packets to launch a DoS attack, especially for attacks through TCP, which includes more than ten types of packets. Figure 17: Commands for Attack Methods Because some of these methods are empty, such as “http_exploit,” “http_xflow,” “http_pps,” and “http_cps,” we deduce that the attacker may have an ongoing development of the malware. CONCLUSION While CVE-2015-2051 is not a new vulnerability and presents a low attack complexity, it has a critical security impact that can lead to remote code execution. Once attackers successfully exploit this vulnerability, they can incorporate compromised devices into their botnet to launch further attacks. FortiGuard Labs has identified one such new botnet, “Goldoon,” that is exploiting this vulnerability, reminding us that botnets continue to evolve and exploit as many devices as possible. We strongly recommend applying patches and updates whenever possible because of the ongoing development and introduction of new botnets. FORTINET PROTECTIONS The malware described in this report is detected and blocked by FortiGuard Antivirus as: BAT/Agent.G!tr.dldr ELF/Agent.JL!tr.dldr ELF/Agent.GLN!tr POWERSHELL/Agent.G!tr.dldr W64/Agent.GLN!tr FortiGate, FortiMail, FortiClient, and FortiEDR support the FortiGuard AntiVirus service. The FortiGuard AntiVirus engine is part of each of these solutions. As a result, customers who have these products with up-to-date protections are protected. The FortiGuard Web Filtering Service blocks the C2 server. FortiGuard Labs provides IPS signatures against attacks exploiting the following vulnerability: CVE-2015-2051: D-Link.Devices.HNAP.SOAPAction-Header.Command.Execution We also suggest that organizations go through Fortinet’s free cybersecurity training module: Fortinet Certified Fundamentals. This module is designed to help end users learn how to identify and protect themselves from phishing attacks. FortiGuard IP Reputation and Anti-Botnet Security Service proactively block these attacks by aggregating malicious source IP data from the Fortinet distributed network of threat sensors, CERTs, MITRE, cooperative competitors, and other global sources that collaborate to provide up-to-date threat intelligence about hostile sources. If you believe this or any other cybersecurity threat has impacted your organization, please contact our Global FortiGuard Incident Response Team. IOCS C2 94[.]228[.]168[.]60 FILES 66f21251d7f8c58316f149fec104723beb979a1215ad4e788d83f0ee6fd34696 712d9abe8fbdff71642a4d377ef920d66338d73388bfee542f657f2e916e219c d7367d41d19baa4f1022f8eb47f7ff1e13f583265c7c26ab96d5f716fa0d61ee fdf6dae772f7003d0b7cdc55e047434dbd089e0dc7664a3fae8ccfd9d10ece8c aa9e6006bce7d0b4554165dba76e67c4a44d98090c9e6ac9f3dca726f6e9adbf fc44018b7432d9e6a1e98f723b0402101fa6e7483d098b10133aac142c0a4a0b e7b78f16d0dfc91b4c7e8fd50fc31eba1eb22ec7030af9bf7c551b6019c79333 0e6eb17664943756cab434af5d94fcd341f154cb36fc6f1ef5eb5cfdce68975f 9af8720766c5f3978718c026c2263801b08634443c93bd67022c56c6ef531ef3 df71219ba6f5835309479b6e3eaca73b187f509b915420656bfe9a9cc32596c2 48130a7c09a5c92e15b3fc0d2e1eb655e0bd8f759e01ba849f7734e32dbc2652 8eb9c1eaecd0dcdd242e1bc8c62a1052915b627abe2de8ce147635fb7da3bfcc b050a1ff0d205f392195179233493ff5b6f44adc93fe0dba1f78c4fe90ebcc46 ffd2d3888b6b1289e380fa040247db6a4fbd2555db3e01fadd2fe41a0fa2debc 88cea61218bdeea94537b74c67873e75b8ada6d050a30d311569c3118d161c46 115e15fbee077a9e126cc0eb349445df34cc9404245520c702fadc5f75b6f859 b10e47db989e29ace6c23ed15e29f313993f95e5e615711060881dfa84618071 037331ab84a841b9d3cfb6f8797c1695e2dc0a2cdcc3f8f3c794dfaa50bcf0df 5631980fab33525f4de1b47be606cd518403f54fa71b81186f02dbf7e9ed0004 246142a5e3f3d3f84d8b38f98ff6897b03628e06e31016b8fafc9eb8c2b6201d 3123a458a6346fd14c5bd7d41cda6c9c9bdabc786366a9ab3d5e7c00132ff835 45bf2c9c6628d87a3cb85ee78ae3e92a09949185e6da11c41e2df04a53bb1274 c81cfe4d3b98d0b28d3c3e7812beda005279bc6c67821b27571240eba440fa49 Tags: botnet RELATED POSTS FortiGuard Labs Threat Research FORTIGUARD LABS TELEMETRY – ROUND UP OF 2015 AND 2016 IOT THREATS (PART 4) – DVR/NVR DEVICES FortiGuard Labs Threat Research FORTIGUARD LABS TELEMETRY – ROUNDUP AND COMPARISON OF 2015 AND 2016 IOT THREATS FortiGuard Labs Threat Research DEFENDING AGAINST THE NEW VPNFILTER BOTNET * * * * * * NEWS & ARTICLES * News Releases * News Articles SECURITY RESEARCH * Threat Research * FortiGuard Labs * Threat Map * Ransomware Prevention CONNECT WITH US * Fortinet Community * Partner Portal * Investor Relations * Product Certifications COMPANY * About Us * Exec Mgmt * Careers * Training * Events * Industry Awards * Social Responsibility * CyberGlossary * Sitemap * Blog Sitemap CONTACT US * (866) 868-3678 Copyright © 2024 Fortinet, Inc. All Rights Reserved Terms of Services Privacy Policy | Cookie Settings COOKIE PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * FUNCTIONAL COOKIES * ADVERTISING COOKIES YOUR PRIVACY A website may store or retrieve certain information about your browser by using cookies. Cookies store information about how a visitor interacts with a website. The information may be about you, your preferences, your browser, or may be used just to make the website function. We allow certain advertising and analytics partners to collect information from our site through cookies and similar technologies to deliver ads which are more relevant to you, and assist us with advertising-related analytics (e.g., measuring ad performance, optimizing our ad campaigns). This may be considered "selling" or "sharing” / disclosure for targeted online advertising under certain laws. To opt out of these activities, move the toggles for "Performance" and "Advertising" to the left and press "Confirm My Choices." You can also click on the different category headings if you would like to read more about the cookies that we use, and adjust your preferences. Please note that your choice will apply only to your current browser/device. You can choose not to allow some types of cookies; however, please note that blocking some categories of cookies may impact your experience of the site. You can visit our Privacy Policy for more information. privacy policy STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the basic functionality of the website. The website would not work without these cookies, so they cannot be switched off in our systems. You can set your browser to block or alert you about these cookies, but some parts of the site will not work. PERFORMANCE COOKIES Performance Cookies These cookies help us collect certain data, such as count visits and traffic sources, so that we can measure the performance of our site, improve the content, and build better features that enhance your experience. They help us to know which pages are the most and least popular and see how visitors move around the site. They also allow us to measure the effectiveness of our ads on other sites. FUNCTIONAL COOKIES Functional Cookies These cookies allow our website to remember your preferences and choices made on the website, such as region and language, which help us provide enhanced functionality and personalization. These cookies may be set by us or by third party providers whose services we have added to our pages. If you disable these cookies, then some or all of these features may not function properly. ADVERTISING COOKIES Advertising Cookies These cookies may be set through our website by our advertising partners, and use information uniquely identifying your browser and internet device to build a profile of your interests and show you relevant ads on other websites. If you disable these cookies, you will experience less targeted advertising. BACK BUTTON BACK Vendor Search Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Allow All COOKIE SETTINGS By clicking "Accept All", you are consenting to the use of cookies on your device to enhance site functionality, analyze site usage, and assist in our marketing efforts. This includes the use of cookies and similar technologies to show you personalized advertising on other websites through our partners. To accept only necessary cookies, select “Reject All.” You can visit the Cookie Settings link, which contains details on specific cookies, categories, and preference options. Your choice will apply only to your current browser/device. Please also see our Privacy Policy for more information on how we process personal data.privacy policy Reject All Accept All Cookie Settings