FICORA and CAPSAICIN Botnets Target Vulnerabilities in Legacy D-Link Routers for DDoS Attacks

Surge in Botnet Activity Targets D-Link Vulnerabilities

A significant increase in botnet activity has been reported in recent months, primarily linked to two emerging threats known as "FICORA" and "CAPSAICIN." Both of these botnets are variants of the established Mirai and Kaiten botnets and demonstrate sophisticated capabilities to execute malicious commands on targeted devices. These developments were detailed in a recent blog post by FortiGuard Labs, a cybersecurity firm that has been closely monitoring the situation.

The primary targets of these botnets are devices that exploit known vulnerabilities in D-Link routers, specifically weaknesses documented as CVE-2015-2051, CVE-2024-33112, and others. Attackers leverage these flaws in the Home Network Administration Protocol (HNAP) interface, allowing them to execute unauthorized commands remotely. This exploitation enables the botnets to gain control over affected devices and launch distributed denial-of-service (DDoS) attacks.

FortiGuard’s research indicates that these botnets utilize shell scripts specifically designed to target Linux systems, effectively terminating the processes of other malware and executing DDoS attacks. The global impact of these activities has been notable, with FICORA affecting multiple countries while CAPSAICIN has focused its operations in East Asia, particularly for intense periods in late October 2024.

Notably, the FICORA botnet employs the ChaCha20 encryption algorithm to encode its configurations, and features capabilities such as brute-force attacks and the ability to manage malware processes through embedded scripts. On the other hand, CAPSAICIN has shown similar functionalities but with a more concentrated operational pattern over two short days.

Despite the known vulnerabilities being nearly a decade old, the persistence of these attacks underscores the critical need for effective mitigation strategies. Experts recommend routine firmware updates and comprehensive network monitoring as essential measures to safeguard against potential breaches.

In analyzing the tactics used in these attacks through the MITRE ATT&CK framework, initial access methods such as exploitation of public-facing applications and vulnerabilities are evident. Persistence tactics may involve creating or modifying service configurations, allowing attackers to maintain control over compromised devices. Furthermore, privilege escalation techniques could have been used to deepen the attacker’s control over the targeted systems.

FortiGuard Labs emphasizes the urgency of addressing these vulnerabilities. As their researcher, Vincent Li, noted, regular updates and vigilant monitoring are essential for enterprises to fortify their defenses against evolving cyber threats. The ongoing enhancements in botnet technology necessitate a proactive and informed response from business owners to mitigate the risk of being compromised.

As the threat landscape continues to evolve, the effective application of cybersecurity measures will be paramount to protect organizations from the repercussions of these sophisticated botnet activities.

Source