Article Details

Scrape Timestamp (UTC): 2024-03-29 12:19:15.058

Source: https://thehackernews.com/2024/03/themoon-botnet-resurfaces-exploiting.html

Original Article Text

Click to Toggle View

TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy. A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called Faceless. "TheMoon, which emerged in 2014, has been operating quietly while growing to over 40,000 bots from 88 countries in January and February of 2024," the Black Lotus Labs team at Lumen Technologies said. Faceless, detailed by security journalist Brian Krebs in April 2023, is a malicious residential proxy service that's offered its anonymity services to other threat actors for a negligible fee that costs less than a dollar per day. In doing so, it allows the customers to route their malicious traffic through tens of thousands of compromised systems advertised on the service, effectively concealing their true origins. The Faceless-backed infrastructure has been assessed to be used by operators of malware such as SolarMarker and IcedID to connect to their command-and-control (C2) servers to obfuscate their IP addresses. That being said, a majority of the bots are used for password spraying and/or data exfiltration, primarily targeting the financial sector, with more than 80% of the infected hosts located in the U.S. Lumen said it first observed the malicious activity in late 2023, the goal being to breach EoL SOHO routers and IoT devices and, deploy an updated version of TheMoon, and ultimately enroll the botnet into Faceless. The attacks entail dropping a loader that's responsible for fetching an ELF executable from a C2 server. This includes a worm module that spreads itself to other vulnerable servers and another file called ".sox" that's used to proxy traffic from the bot to the internet on behalf of a user. In addition, the malware configures iptables rules to drop incoming TCP traffic on ports 8080 and 80 and allow traffic from three different IP ranges. It also attempts to contact an NTP server from a list of legitimate NTP servers in a likely effort to determine if the infected device has internet connectivity and it is not being run in a sandbox. The targeting of EoL appliances to fabricate the botnet is no coincidence, as they are no longer supported by the manufacturer and become susceptible to security vulnerabilities over time. It's also possible that the devices are infiltrated by means of brute-force attacks. Additional analysis of the proxy network has revealed that more than 30% of the infections lasted for over 50 days, while about 15% of the devices were part of the network for 48 hours or less. "Faceless has become a formidable proxy service that rose from the ashes of the 'iSocks' anonymity service and has become an integral tool for cyber criminals in obfuscating their activity," the company said. "TheMoon is the primary, if not the only, supplier of bots to the Faceless proxy service." The Strategic Guide to Cloud Security Unlock practical steps to securing everything you build and run in the cloud. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class Internet intelligence from Censys Search.

Daily Brief Summary

CYBERCRIME // TheMoon Botnet Hijacks EoL Devices for Faceless Proxy Network

TheMoon, a botnet first detected in 2014, has resurfaced, taking control of outdated routers and IoT devices to grow its network for a proxy service named Faceless.

Over 40,000 compromised bots from 88 countries were part of TheMoon’s network in early 2024, offering anonymity services for other threat actors at a low cost.

The compromised devices are primarily utilized for password spraying, data exfiltration, and concealing the origins of malicious traffic from malware operators.

Black Lotus Labs discovered the resurgence of TheMoon in late 2023, where attackers infect end-of-life devices with an updated version of the malware to integrate them into the Faceless service.

The malware employs various techniques, including spreading via a worm module, configuring iptables rules to manage incoming traffic, and evading sandboxes by checking internet connectivity through legitimate NTP servers.

Analysis showed significant persistence with 30% of infections lasting more than 50 days, indicating the strength of the Faceless proxy service within cybercriminal circles.

The elderly and vulnerable status of target devices, such as unsupported routers and IoT products, underscores the importance of protecting and updating hardware to prevent exploitation.