We use cookies to improve your experience. Do you accept?

Skip to main content

Cyware Daily Threat Intelligence, January 08, 2025

shutterstock 1709630365

Daily Threat Briefing Jan 8, 2025

The Gayfemboy botnet has emerged as a powerful tool in the Mirai-based arsenal, evolving with zero-day exploits targeting industrial routers and smart home devices. With around 15,000 active bot nodes daily, it uses vulnerabilities in industrial routers to launch high-intensity DDoS attacks exceeding 100 Gbps.

A cunning social engineering campaign in the Middle East sees fraudsters posing as government officials to exploit customer trust. Victims are lured into installing remote access software under the guise of resolving purchase complaints. Using tools like RedLine Stealer, the attackers steal credit card details and intercept OTPs.

CISA’s KEV catalog now includes critical flaws in Mitel MiCollab and Oracle WebLogic Server, highlighting active exploitation. The vulnerabilities like allow unauthorized access and remote code execution, urging federal agencies to update systems by January 28 to mitigate risks effectively.

Top Malware Reported in the Last 24 Hours

New Mirai botnet targets industrial routers

A new Mirai-based botnet, named Gayfemboy, has become more advanced, using zero-day exploits for security flaws in industrial routers and smart home devices. One notable vulnerability is CVE-2024-12856, found in Four-Faith industrial routers, with exploitation efforts spotted around December 20. It has about 15,000 active bot nodes daily, primarily in countries like China, the U.S., Russia, Turkey, and Iran. The botnet's main aim is to carry out distributed DDoS attacks for profit, with activity spiking in October and November 2024. The botnet leverages a mix of public and private exploits for over 20 vulnerabilities and is capable of high-intensity DDoS attacks exceeding 100 Gbps.

Fake refund schemes in Middle East

A sophisticated social engineering scheme is targeting customers in the Middle East, where fraudsters impersonate government officials to gain trust and use remote access software to steal credit card details. The victims are typically individuals who have lodged complaints with the government about unsatisfactory purchases. The fraudsters exploit this by posing as government representatives offering assistance with the complaints and then tricking victims into installing remote access software. Once the software is installed, the fraudsters steal credit card information and intercept OTPs to make fraudulent transactions. The scheme involves the use of RedLine Stealer malware to acquire victims' personal data. 

Top Vulnerabilities Reported in the Last 24 Hours

CISA adds two critical flaws to KEV catalog

The CISA added three vulnerabilities affecting Mitel MiCollab and Oracle WebLogic Server to its KEV catalog, noting evidence of active exploitation. The vulnerabilities include CVE-2024-41713 (CVSS score: 9.1), allowing unauthorized access to Mitel MiCollab and CVE-2024-55550 (CVSS score: 4.4), enabling authenticated administrators to read local files. CVE-2020-2883 (CVSS score: 9.8) could be exploited by unauthenticated attackers on Oracle WebLogic Server. Federal agencies must apply necessary updates by January 28.

Google and Mozilla release updates

Google and Mozilla released new security updates for their browsers, addressing several high-risk vulnerabilities. Google launched a Chrome 131 update that fixes four security issues, including a severe type confusion flaw (CVE-2025-0291) in the V8 JavaScript engine. This flaw could allow attackers to execute code remotely. Mozilla patched 11 vulnerabilities in Firefox, including three high-severity flaws related to memory safety and an address bar spoofing issue for Android. 

Major bug in Illumina iSeq 100 DNA sequencers

The Illumina iSeq 100 DNA sequencing instrument has been found to have firmware security vulnerabilities, allowing potential attackers to brick the device or plant persistent malware. The outdated BIOS firmware lacks standard protections such as Secure Boot, making it susceptible to malicious firmware modifications. Illumina has released a fix after responsible disclosure.

Related Threat Briefings