{"id":17987,"date":"2022-02-02T10:18:14","date_gmt":"2022-02-02T18:18:14","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11720\/"},"modified":"2022-02-02T10:18:14","modified_gmt":"2022-02-02T18:18:14","slug":"news-11720","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11720\/","title":{"rendered":"MANGA aka Dark Mirai-based Campaign Targets New TP-Link Router RCE Vulnerability"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn aem-GridColumn--default--12\">         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p><b><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs.html?utm_source=blog&amp;utm_medium=campaign&amp;utm_campaign=FortiGuardLabs\">FortiGuard Labs<\/a>\u00a0Threat\u00a0Research Report<\/b><\/p>\n<p><b>Affected Platforms:<\/b>\u00a0Linux<br \/> <b>Impacted Users:<\/b>\u00a0 \u00a0 \u00a0 Any organization<br \/> <b>Impact:<\/b>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Remote attackers gain control of the vulnerable systems<br \/> <b>Severity Level:<\/b>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0Critical<\/p>\n<p><u><br \/> <\/u>Last week, our FortiGuard Labs team encountered a malware sample that\u2019s currently being distributed in the wild targeting TP-link wireless routers. It leverages a recently post-authenticated RCE vulnerability\u00a0released barely two weeks prior.<\/p>\n<p>As it turns out, it is an updated variant of the MANGA campaign (also known as Dark) that distributes samples based on Mirai\u2019s published source code. This Mirai-based Distributed Denial of Service (DDOS) botnet campaign is one that FortiGuard Labs has been\u00a0<a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/the-ghosts-of-mirai\">actively monitoring<\/a>. The campaign originally piqued our interest due to the continuous updating of its list of target vulnerabilities\u2014more so than other campaigns we have seen so far.<\/p>\n<p>TP-Link has already released an\u00a0<a href=\"https:\/\/www.tp-link.com\/sg\/support\/download\/tl-wr840n\/v5\/\">updated firmware<\/a>\u00a0for this affected hardware version\u00a0\u00a0and users are strongly encouraged to update their devices.<\/p>\n<p>This post details how this threat leverages the new vulnerability to take over the affected devices and ways to protect users from these attacks.<\/p>\n<h2>Exploiting a New Vulnerability<\/h2>\n<p>This Mirai-based botnet campaign is referred to as MANGA because of the token string it used to include in its SSH\/telnet commands. It is also referred to as Dark due to the filenames used for its binaries (e.g., Dark.arm, dark.mips, etc.).\u00a0<\/p>\n<p>By exploiting recently published vulnerabilities, this malware campaign capitalizes on the gap between the time of disclosure of a vulnerability and the application of a patch to compromise IoT devices. This gives it a higher potential of spreading, making it more prolific than similar botnets. The latest addition to its constantly growing list of targeted vulnerabilities is TP-Link Home Wireless Routers, particularly the TL-WR840N EU (V5) model.<\/p>\n<p>The vulnerability it targets, assigned\u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41653\">CVE-2021-41653<\/a>, was only just discovered on November 12 of this year. And barely two weeks later, on November 22, a sample from the MANGA malware campaign was seen actively exploiting it in the wild.<\/p>\n<p>Kamill\u00f3 Matek discusses the full details of this vulnerability in this\u00a0<a href=\"https:\/\/k4m1ll0.com\/cve-2021-41653.html\">article<\/a>. In summary, a vulnerable\u00a0<i>host\u00a0<\/i>parameter allows authenticated users to execute arbitrary commands in the target device.\u00a0<\/p>\n<p>In this case, it is being exploited to force vulnerable devices to download and execute a malicious script,\u00a0<i>tshit.sh<\/i>, which then downloads the main binary payloads, as discussed in the next section.<\/p>\n<p>To accomplish this, the following requests are sent to the device:<\/p>\n<p><u>Request 1:<\/u> <\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/manga-aka-dark-mirai-based-campaign-targets-new-tp-link-router-rce-vulnerability\/_jcr_content\/root\/responsivegrid\/image_864586113.img.png\/1638574113214\/screen-shot-2021-12-03-at-3.19.16-pm.png\" alt=\"image\"\/>         <\/noscript>                   <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p><u>Request 2:<\/u><\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/manga-aka-dark-mirai-based-campaign-targets-new-tp-link-router-rce-vulnerability\/_jcr_content\/root\/responsivegrid\/image_913592964.img.png\/1638574145272\/screen-shot-2021-12-03-at-3.19.20-pm.png\" alt=\"image\"\/>         <\/noscript>                   <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>It is important to emphasize that this exploitation requires authentication to succeed. Therefore, it is crucial for users to change their default credentials.<\/p>\n<h2>Same Package<\/h2>\n<p>As with Mirai\u2019s normal infection routine, the executed shell script downloads the main payload binaries for different architectures and platforms and executes them blindly in the victim\u2019s system. In addition, it prevents other botnets from taking over the device by blocking connections to commonly targeted ports.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/manga-aka-dark-mirai-based-campaign-targets-new-tp-link-router-rce-vulnerability\/_jcr_content\/root\/responsivegrid\/image_1366003414.img.png\/1638574188939\/picture1.png\" alt=\"Figure 1 - tshit.sh downloads the main payload and blocks connections\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 1 &#8211; tshit.sh downloads the main payload and blocks connections<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The malware then waits for a command from its Command-and-Control (C2) server to perform different variations of a Denial-Of-Service (DOS) attack.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--offset--default--4 aem-GridColumn--default--4\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/manga-aka-dark-mirai-based-campaign-targets-new-tp-link-router-rce-vulnerability\/_jcr_content\/root\/responsivegrid\/image_2103181590.img.png\/1638574213393\/picture2.png\" alt=\"Figure 2 Functions related to DDOS attacks\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2 Functions related to DDOS attacks<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>Solution<\/h2>\n<p>Fortinet customers are protected by the following:<\/p>\n<ul>\n<li>The following generic FortiGuard IPS signatures were able to detect this attack before this vulnerability was disclosed:\n<ul>\n<li>TP-Link.HTTP.Management.Code.Execution<\/li>\n<li>TP-Link.Home.Wifi.Router.CGI.Referer.Command.Injection<\/li>\n<\/ul>\n<\/li>\n<li>The FortiGuard Web Filtering Service blocks downloaded URLs and identified C2s.<\/li>\n<li>The\u00a0FortiGuard AntiVirus service detects and blocks this threat as\u00a0Linux\/Mirai and ELF\/Mirai<\/li>\n<\/ul>\n<h2>Conclusion<\/h2>\n<p>Through our active monitoring, we encountered a new variant of the Mirai-based botnet campaign referred to as MANGA or Dark. It targets a recently published TP-Link wireless router RCE vulnerability.\u00a0<\/p>\n<p>Throughout its life, this ongoing campaign has been very active in targeting newly discovered vulnerabilities. In fact, right before this blog was published, our monitoring system encountered yet another updated variant that we are currently investigating.<\/p>\n<p><b><\/b>FortiGuard Labs will continue monitoring this campaign and provide updates as necessary.<\/p>\n<h2>IOCs<br \/> <\/h2>\n<p><u>Download URLs<\/u><\/p>\n<p>http[:]\/\/194.85.248.176\/bins\/eh.x86<br \/> http[:]\/\/194.85.248.176\/bins\/eh.mips<br \/> http[:]\/\/194.85.248.176\/bins\/eh.mpsl<br \/> http[:]\/\/194.85.248.176\/bins\/eh.arm4<br \/> http[:]\/\/194.85.248.176\/bins\/eh.arm5<br \/> http[:]\/\/194.85.248.176\/bins\/eh.arm6<br \/> http[:]\/\/194.85.248.176\/bins\/eh.arm7<br \/> http[:]\/\/194.85.248.176\/bins\/eh.ppc<br \/> http[:]\/\/194.85.248.176\/bins\/eh.m68k<br \/> http[:]\/\/194.85.248.176\/bins\/eh.sh4<br \/> http[:]\/\/194.85.248.176\/bins\/eh.86_64<br \/> http[:]\/\/194.85.248.176\/local.sh<br \/> http[:]\/\/194.85.248.176\/tshit.sh<br \/> http[:]\/\/2.56.59.215\/apache2.sh<br \/> http[:]\/\/212.192.241.72\/lolol.sh<\/p>\n<p><u>Samples (SHA256)<\/u><\/p>\n<p>ebfc95372427f8b845daff9ff4aebe2451fa78e35a24edd084685f06ba3daee4<br \/> 57f50f34e6df8ee9006e46b5fe5c4ee11febe9e33b087c809f1384563e9f1d4e<br \/> 8ebef715ddb0b4e973b2f8c7529f4480b5caa9c4a25f8fd05a7eaacf036cca20<br \/> 113be1f9db8af2469b82ce1b5d1b0c61c50586567b3898f2b8a614cd6e8f47a8<br \/> b4c3c79d148db638f891143a1910c3d17f973c512a719b1f7525a823b14d29a8<br \/> d3928d0b6dedce6a083123028e50ba76e1b29666e70a96eec1a7061b7303bf1a<br \/> 6b463e9f5d9e8edbc235bceb854367b26ed6effb0dee9881a4f4e88a967318d5<br \/> d88052c0a76cac7e571870a4e87c5354594c26b4955cd934870dc12d48f129d5<br \/> 265396023cbbad6b3480b851873ece9fa2f32c63739a7a0ac32d196843080cc8<br \/> 83566400bdb09c5e2438c0d9ff723c88328ca93f29e648f97088342e239bfa09<br \/> af9ac01e9e8cf7064d590044df43adca566521d223662cf5e0e2500badff6998<br \/> de01f26209a085eeff8c217782d283640a6226ccf1bd27eefd696658b55d10ba<br \/> a4b16a5bf9b6e662050a3c5ff157d7b2f0be301a1f8f5d1359170132b8b22e58<br \/> 7a47e5b83e3c42df2ab72adf4a041b2e382f61a0ff378f593156353a78c2c702<br \/> 1bd895ed050ce42d0f39b6baa0b6a454e05eb5bff72290857cb8fb77a9e4b4b9<br \/> 71ca57bbba49aa877f7ded340328342c6e82e3a99720734c8b0de150d44d906c<br \/> 23b03aa7d1dadd2e71016702f3e1b278b3a2c4f0c7d0cdc272774a428b88d09c<br \/> fb7b03e7619d3ac5c4cbadc6b38841b11e3b19214b776073a590b571f91fe51e<br \/> 3c978e02d21c7c12631d56c41aceb305fc11348a53eed47e29f7ce62ea0da4df<br \/> 4832cff5666433a784d6ba48a0e400367d25314ef15d08a216b6286226eff342<br \/> 95e4ac3ae03646cda56d80df80d775ed4bf23f98be42274fb440e7bc0d03ce88<br \/> 8d390ad5af8d70692bda123b96e9745816ec7893d84682adb6d243619538b9d3<br \/> 66adea50e0de8e1d664bb18c9f80596d1443b90e9ba57a59425720886a0c97e0<br \/> a87b502575d0db1b6257f1cf75edf4894bc84598f79148525b5cc449d143a495<\/p>\n<p><i>Learn more about Fortinet\u2019s\u00a0<\/i><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?utm_source=blog&amp;utm_campaign=fortiguard-labs\"><i>FortiGuard Labs<\/i><\/a><i>\u00a0threat research and intelligence organization and the FortiGuard Security Subscriptions and Services\u00a0<\/i><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?tab=security-bundles&amp;utm_source=blog&amp;utm_campaign=security-bundles\"><i>portfolio<\/i><\/a><i>.<\/i><\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/manga-aka-dark-mirai-based-campaign-targets-new-tp-link-router-rce-vulnerability\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"\/blog\/threat-research\/manga-aka-dark-mirai-based-campaign-targets-new-tp-link-router-rce-vulnerability\/_jcr_content\/root\/responsivegrid\/image_864586113.img.png\/1638574113214\/screen-shot-2021-12-03-at-3.19.16-pm.png\"\/><br \/>FortiGuard Labs encountered a malware sample that\u2019s currently being distributed in the wild targeting TP-link wireless routers. Learn more on MANGA aka Dark Mirai-based Campaign.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-17987","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17987"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17987\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17987"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}