Malware News Unpatched D-Link Routers Worldwide Targeted by New Malware

enaph

Level 29
Thread author
Verified
Honorary Member
Top Poster
Well-known
Jun 14, 2011
1,893
FortiGuard Labs has identified continued botnet activity exploiting vulnerabilities in D-Link routers, demonstrating how legacy security flaws remain a persistent threat. Two botnets, “FICORA” and “CAPSAICIN,” were found targeting vulnerabilities in aging D-Link firmware, including flaws disclosed nearly a decade ago.

The analysis, conducted in October and November 2024, focused on the Mirai-based “FICORA” and the Kaiten-variant “CAPSAICIN”, both of which leverage weaknesses in the Home Network Administration Protocol (HNAP) interface.

Devices affected include several D-Link models with firmware versions dating back to CVE-2015-2051, CVE-2019-10891, CVE-2022-37056, and CVE-2024-33112. Vulnerable devices include D-Link DIR-645, DIR-806, GO-RT-AC750, and DIR-845L routers. Attackers exploit these vulnerabilities to execute commands remotely, enabling them to control affected devices, often using them in Distributed Denial of Service (DDoS) attacks.

FICORA: global impact​

The FICORA botnet was observed initiating attacks from servers in the Netherlands and infecting devices worldwide. Its attack chain begins by downloading and executing a malicious shell script named “multi”, which uses tools like wget, curl, tftp, and ftpget to distribute malware to various Linux architectures, including ARM, MIPS, PowerPC, and x86 variants.

The malware uses ChaCha20 encryption for C2 server configurations, features brute-force attack functionality using hard-coded username-password pairs, while it also employs a script that terminates competing malware processes such as “dvrHelper.” FICORA has been linked to a series of UDP, TCP, and DNS flood DDoS attacks, making it a potent tool for disruption.

ficora.jpeg


FICORA's spread worldwide
Fortinet

CAPSAICIN: short-lived but focused​

The CAPSAICIN botnet, active primarily on October 21 and 22, 2024, heavily targeted East Asian countries. Delivered via a malicious script named “bins.sh”, it infects multiple Linux architectures and immediately eliminates other botnet processes to ensure exclusive execution.

Upon infecting a device, CAPSAICIN establishes a connection with its C2 server, transmitting OS information and a unique identifier, and executes a range of C2 commands, including setting up environment variables and triggering DDoS attacks. The malware also utilizes a “help” function embedded in its code for attackers, detailing parameters for its functions. Researchers believe CAPSAICIN is derived from the Keksec group's botnets, with hard-coded version indicators confirming its lineage.

ddos-1024x548.jpeg


CAPSAICIN's DDoS commands
Fortinet
D-Link, a major provider of networking equipment, has faced criticism recently for shipping insecure firmware and refusing to issue fixing patches for EoL devices still used by tens of thousands. While the vulnerabilities in question were patched years ago, many devices remain unpatched or unsupported due to end-of-life status, leaving them exposed to exploitation.

Users are advised to update their router firmware, replace aging devices, separate IoTs from critical systems, and monitor for suspicious activity like the appearance of new admin users or change of DNS settings.
 

Jonny Quest

Level 22
Verified
Top Poster
Well-known
Mar 2, 2023
1,191
After I saw this I reviewed the TP-Link thread, wondering the same thing, but fortunately it doesn't sound like it's going to be the case.

From what I could find, those models are 10 - 13 years old so I understand the lack of firmware support, EOL and the need of being replaced. There does come that time.
 

SeriousHoax

Level 49
Verified
Top Poster
Well-known
Mar 16, 2019
3,893
Good to see that my cheap D-Link DIR-615 is not one of the vulnerable ones. Looking at the model's name, it seems my router is older than the vulnerable DIR-645 but according to D-Link's website 645 is EOL while my 615 is still actively manufactured and sold by them. Maybe the versioning method is different here. So, I hope if any vulnerability is discovered, even my cheap router will be receiving a firmware update. BTW, the firmware update link for my router is a .ru domain and it also has the ability to set Yandex DNS in the browser setting. So, I guess the router was created for the Russian market or maybe not because the interface and everything else is in English.
 
Last edited:
  • Like
Reactions: Jonny Quest

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top