Press ESC to close

FBI Warns of HiatusRAT Malware Targeting Webcams and DVRs

Category Details
Threat Actors HiatusRAT malware operators.
Campaign Overview Targeting Chinese-branded web cameras and DVRs, exploiting outdated devices and leveraging remote access.
Target Regions/Victims U.S., Canada, UK, Australia, New Zealand, Taiwanese organizations, and a U.S. government server.
Methodology Exploiting unpatched security flaws, brute-forcing access, and using insecure protocols like telnet.
Product Targeted Hikvision cameras, D-Link devices, and Xiongmai devices.
Malware Reference HiatusRAT, used for device infiltration and creating a covert command-and-control network.
Tools Used Ingram (webcam-scanning tool), Medusa (brute-force tool), leveraging telnet access.
Vulnerabilities Exploited CVE-2017-7921 (Hikvision), CVE-2020-25078 (D-Link), CVE-2018-9995, CVE-2021-33044, CVE-2021-36260.
TTPs Passive traffic collection, command-and-control network creation, brute-forcing, scanning for vulnerabilities.
Attribution FBI PIN report links HiatusRAT campaigns to evolving malware operations since 2022.
Recommendations Isolate vulnerable devices, patch/update systems promptly, enforce strong password policies, use MFA, and monitor networks.
Source Hackread 

Read full article: https://hackread.com/fbi-warns-hiatusrat-malware-targeting-webcams-dvrs/

The above summary has been generated by an AI language model

Source: Hackread

Published on: December 18, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *