DDoS botnets have abused three zero-days in LILIN video recorders for months

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,148
At least three botnet operators have secretly exploited three zero-day vulnerabilities in LILIN digital video recorders (DVRs) for more than six months before the vendor finally patched the bugs last month, in February 2020.

Digital video recorders are devices installed on company networks that aggregate video feeds from local CCTV or IP camera systems and record it on various types of storage systems, like HDDs, SSDs, USB flash drives, or SD memory cards.
In a blog post published yesterday, the Netlab team at Chinese security firm Qihoo 360 said it detected three botnets utilizing zero-days in LILIN DVRs.
  1. A vulnerability in the NTPUpdate process lets attackers inject and run system commands
  2. Through the use of one of two hardcoded credentials (root/icatch99 and report/8Jg0SR8K50) an attacker can retrieve and modify a DVR's config file, and then execute commands on the device when the FTP (File Transfer Protocol) server configuration is periodically synchronized.
  3. Similar to above, but via the NTP (Network Time Protocol) service.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top