FreakOut Botnet Turns DVRs Into Monero Cryptominers

  • Becky Bracken--Threatpost
  • published date: 2021-10-13 20:17:09 UTC

The new Necro Python exploit targets Visual Tool DVRs used in surveillance systems.

<div class="c-article__content js-reading-content"> <p>Threat group FreakOut’s Necro botnet has developed a new trick: infecting Visual Tools DVRs with a Monero miner. </p> <p>Juniper Threat Labs researchers have issued a report detailing <a href="" target="_blank" rel="noopener">new activities from FreakOut</a>, also known as Necro Python and Python.IRCBot. In late September, the team noticed that the botnets started to target Visual Tools DVR VX16 models with cryptomining attacks. The devices are typically deployed as part of a professional-quality surveillance system. </p> <p>A <a href="" target="_blank" rel="noopener">command injection vulnerability</a> was found in the same devices last July. Visual Tools has not yet responded to Threatpost’s request for comment. </p> <p><a href=";utm_medium=ART&amp;utm_campaign=InfosecInsiders_Newsletter_Promo/" target="_blank" rel="noopener"><img loading="lazy" class="aligncenter wp-image-168544 size-full" src="" alt="Infosec Insiders Newsletter" width="700" height="50"></a></p> <p>“The script can run in both Windows and Linux environments,” the Juniper report said. “The script has its own polymorphic engine to morph itself every execution which can bypass signature-based defenses. This works by reading every string in its code and encrypting it using a hardcoded key.”</p> <p>FreakOut has been <a href="" target="_blank" rel="noopener">on the scene since</a> at least January, exploiting recently identified and unpatched vulnerabilities to launch distributed denial-of-service (DDoS) and <a href="" target="_blank" rel="noopener">cryptomining attacks</a>. Juniper reports that the threat actors have developed several iterations of the Necro bot, making steady improvements in its performance and persistence over the past several months. </p> <p>“We have noted a few changes on this bot from the previous version,” the report said. “First, it removed the SMB scanner which was observed in the May 2021 attack. Second, it changed the url that it injects to script files on the compromised system.”</p> <h2><b>New DGA Functionality Helps Evade Detection </b></h2> <p>The team explained that more recent versions of the Necro bot scrapped its previous reliance on a hardcoded URL for a domain generation algorithm (DGA) for added persistence. </p> <p>The new exploit has not yet been fully <a href="" target="_blank" rel="noopener">evaluated for a CVE</a>, according to NIST, but <a href="" target="_blank" rel="noopener">a proof of concept</a> is available through the Exploit Database. </p> <p>First the Necro bot scans for the target port: [22, 80, 443, 8081, 8081, 7001]. If detected, it will launch a <a href=",(both%20x86%20and%20x86_64).&amp;text=Execution%20of%20the%20miner%20will,power%20to%20mine%20Monero%20coins." target="_blank" rel="noopener">XMRig</a> – that’s a high-performance Monero (XMR) miner – linked to this wallet: </p> <p>[45iHeQwQaunWXryL9YZ2egJxKvWBtWQUE4PKitu1VwYNUqkhHt6nyCTQb2dbvDRqDPXveNq94DG9uTndKcWLYNoG2uonhgH]</p> <p>The team added that the bot is also still actively trying to exploit these previously identified vulnerabilities: </p> <ul> <li style="font-weight: 400">CVE-2020-15568 – TerraMaster TOS before 4.1.29</li> <li style="font-weight: 400">CVE-2021-2900 – Genexis PLATINUM 4410 2.1 P4410-V2-1.28</li> <li style="font-weight: 400">CVE-2020-25494 – Xinuos (formerly SCO) Openserver v5 and v6</li> <li style="font-weight: 400">CVE-2020-28188 – TerraMaster TOS &lt;= 4.2.06</li> <li style="font-weight: 400">CVE-2019-12725 – Zeroshell 3.9.0</li> </ul> <p>Mounir Hahad, head of Juniper Threat Labs, told Threatpost that security teams need security that’s equipped to handle DGA domain attempts. </p> <p>“The very existence of this kind of botnet highlights the need for a connected security approach where DNS security capabilities on the network identify connection attempts to DGA domains behind public dynamic DNS services, as well as routers, switches, and firewalls that are capable of immediately isolating the compromised host from the rest of the network,” Hahad said.<br> <em><strong>Check out our free </strong></em><a href="" target="_blank" rel="noopener"><em><strong>upcoming live and on-demand online town halls</strong></em></a><em><strong> – unique, dynamic discussions with cybersecurity experts and the Threatpost community.</strong></em></p> <footer class="c-article__footer"> <div class="c-article__footer__container"> <div class="c-article__footer__col"> <a href="#discussion" class="c-button c-button--secondary">Write a comment</a> </div> <div class="c-article__footer__col"> <div class="c-article__sharing"> <p><strong>Share this article:</strong></p> <nav class="c-nav-sharing"> <div class="social-likes social-likes_notext" data-title="FreakOut Botnet Turns DVRs Into Monero Cryptominers" data-url="" data-counters="no" data-zeroes="yes"><div class="facebook" title="Share via Facebook"></div> <div class="twitter" title="Share via Twitter"></div><div class="linkedin" title="Share via LinkedIn"></div> <div class="reddit" title="Share via Reddit"></div> <div class="flipboard" title="Share via Flipboard"></div> </div> </nav> </div> </div> </div> <div class="c-article__footer__container"> <div class="c-article__footer__col"></div> <div class="c-article__footer__col"> <ul class="c-list-categories"> <li><a class="c-label c-label--secondary-transparent" href="">Hacks</a></li> <li><a class="c-label c-label--secondary-transparent" href="">Malware</a></li> <li><a class="c-label c-label--secondary-transparent" href="">Vulnerabilities</a></li> <li><a class="c-label c-label--secondary-transparent" href="">Web Security</a></li> </ul> </div> </div> </footer> </div>