April 20, 2020 By David Bisson 3 min read

Last week in security news, researchers revealed that a new malware family called Mozi is in the process of building an internet of things (IoT) botnet. Mozi wasn’t the only digital threat that made its first appearance in news headlines that week. Speculoos backdoor also gained some attention for a new attack campaign perpetrated by the APT41 threat actor.

Top Story of the Week: Mozi’s IoT Bots

In December 2019, Black Lotus Labs at CenturyLink noticed that the security firm’s reputation systems had registered an increase in activity involving the otherwise static IoT Reaper malware family. The research team decided to investigate further. This effort revealed that IoT Reaper had nothing to do with the attack and that the activity actually involved a new malware family whose compromised hosts contained references to files with “Mozi” in their names.

Black Lotus Labs ultimately learned that CenturyLink’s reputation systems had mislabeled the activity because Mozi had evolved from the source code of IoT Reaper, Gafgyt and Mirai. It used this code to begin building a P2P botnet of its own by targeting routers, DVRs and other IoT devices that were either unpatched or unprotected by strong credentials.

Source: iStock

Also in Security News

  • TA505 Targeted Networks With SDBbot RAT: IBM X-Force revealed that it spotted a campaign in which the threat actor Hive0065, otherwise known as TA505, leveraged spear phishing emails impersonating Onehub to target enterprise employees in Europe. Those emails sought to steal users’ credentials and infect their machines with the SDBbot remote-access Trojan (RAT).
  • New York State Confirmed Intrusion Against Government Network: As reported by The Wall Street Journal, New York’s Office of Information Technology Services discovered a breach in late January in which attackers had constructed tunnels into servers used for relaying sensitive data. The state responded by hiring outside security services and working with the FBI to investigate the incident.
  • Speculoos Backdoor Distributed by Campaign Exploiting CVE-2019-19781: In an attack spotted by Palo Alto Networks’ Unit 42, malicious actors targeted various organizations in North America, South America and Europe with a campaign that exploited CVE-2019-19781. This flaw granted attackers the capability of executing remote code for the purpose of installing Speculoos.
  • AZORult, NanoCore RAT Delivered by FreeDom Loader: Zscaler observed that the attack campaign began with malspam messages carrying PowerPoint files. These attachments relied on macros to download an encoded VBScript from Pastebin, a script that then used PowerShell to spawn FreeDom loader for the purpose of installing AZORult or NanoCore RAT.
  • WebEx Users Targeted With Spoofed IT Security Alerts: Per Cofense, this attack campaign sought to target WebEx users by sending out messages from an address designed to look like “meetings[@]webex[.]com.” Those messages attempted to trick recipients into visiting a phishing landing page designed to steal their WebEx credentials.
  • Nemty Ransomware’s Operators Announced End of RaaS Program: ZDNet learned that the operators of Nemty ransomware had announced on the dark web that they would be shutting down their creation’s ransomware-as-a-service (RaaS) platform. Shortly after that announcement, these malicious actors also closed the portal used by Nemty to leak its victims’ data.

Security Tip of the Week: Secure Your IoT Devices

Security professionals can help defend their organizations against malware such as Mozi by improving the authentication measures on their IoT devices. Specifically, they should enable two-factor authentication where it’s available and implement strong passwords on all of their corporate assets. Infosec personnel also need to invest in their ability to passively discover all of their IoT devices so that they can locate and remediate vulnerabilities and other security risks on a timely basis.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today