• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Realtek Vulnerability Under Attack: 134 Million Attempts in 2 Months to Hack IoT Devices

You are here: Home / Cyber Security News / Realtek Vulnerability Under Attack: 134 Million Attempts in 2 Months to Hack IoT Devices

Researchers are warning about a spike in exploitation attempts weaponizing a critical remote code execution flaw in Realtek Jungle SDK since the start of August 2022.

In accordance to Palo Alto Networks Device 42, the ongoing marketing campaign is stated to have recorded 134 million exploit attempts as of December 2022, with 97% of the assaults developing in the previous four months.

Shut to 50% of the assaults originated from the U.S. (48.3%), adopted by Vietnam (17.8%), Russia (14.6%), The Netherlands (7.4%), France (6.4%), Germany (2.3%, and Luxembourg (1.6%).

What is extra, 95% of the assaults leveraging the security shortcoming that emanated from Russia singled out businesses in Australia.

“Numerous of the attacks we noticed attempted to supply malware to infect susceptible IoT products,” Device 42 scientists reported in a report, incorporating “danger groups are employing this vulnerability to have out substantial-scale attacks on intelligent devices all around the environment.”

The vulnerability in query is CVE-2021-35394 (CVSS rating: 9.8), a established of buffer overflows and an arbitrary command injection bug that could be weaponized to execute arbitrary code with the highest level of privilege and acquire above influenced appliances.

The issues had been disclosed by ONEKEY (formerly IoT Inspector) in August 2021. The vulnerability impacts a extensive vary of units from D-Link, LG, Belkin, Belkin, ASUS, and NETGEAR.

Device 42 reported it uncovered 3 various forms of payloads distributed as a final result of in-the-wild exploitation of the flaw –

  • A script executes a shell command on the specific server to download more malware
  • An injected command that writes a binary payload to a file and executes it, and
  • An injected command that instantly reboots the focused server to result in a denial-of-company (DoS) ailment

Also delivered by means of the abuse of CVE-2021-35394 are known botnets like Mirai, Gafgyt, and Mozi, as perfectly as a new Golang-centered dispersed denial-of-services (DDoS) botnet dubbed RedGoBot.

Initial noticed in September 2022, the RedGoBot campaign involves dropping a shell script that’s made to down load a range of botnet shoppers tailored to distinctive CPU architectures. The malware, after launched, is geared up to run operating method commands and mount DDoS attacks.

The findings once yet again underscore the importance of updating software program in a timely vogue to prevent exposure to prospective threats.

“The surge of assaults leveraging CVE-2021-35394 reveals that menace actors are quite fascinated in provide chain vulnerabilities, which can be complicated for the average consumer to establish and remediate,” the researchers concluded. “These issues can make it tricky for the affected user to discover the unique downstream products that are currently being exploited.”

Observed this short article fascinating? Comply with us on Twitter  and LinkedIn to go through far more unique material we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Gootkit Malware Continues to Evolve with New Components and Obfuscations
Next Post: Eliminating SaaS Shadow IT is Now Available via a Free Self-Service Productwww.wing.securitySaaS Security / Shadow ITThis new product provides IT and Security visibility into the risky SaaS apps employees are using. »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.