Rewterz Threat Alert – Lazarus APT Group – Active IOCs
January 19, 2022Rewterz Threat Advisory – Cisco Webex Meetings and Redundancy Configuration Manager Vulnerabilities
January 20, 2022Rewterz Threat Alert – Lazarus APT Group – Active IOCs
January 19, 2022Rewterz Threat Advisory – Cisco Webex Meetings and Redundancy Configuration Manager Vulnerabilities
January 20, 2022Severity
High
Analysis Summary
A new Mirai variant is making the rounds called mirai_pteamirai. The botnet exploits a vulnerability in KGUARD DVR to spread within an environment. The vulnerability exists in the 2016 firmware version and is fixed in any version after the 2017 release. This botnet is active and used to cause DDoS conditions.
Impact
- Server Outage
- Data Loss
- Website Downtime
Indicators of Compromise
SHA-256
- 850a3a91c7072b434c9331788453e18cdf33ab04d5f45f17c4846d7a656abc8f
- d506a6afcb0f8387a76b9a24278fcbc63a61b656c42628070fdf1cc42b74c84d
- 2ee6d6a0e7df591c4017a239636e6e08869829b1e03e5374fe07afffc180ea20
- cf892d06c6f1bb15eef645ed8a8ba3d72a15c8cd3b094f823ad3a96b5cadd25a
Remediation
- Upgrade your operating system.
- Don’t open files and links from unknown sources.
- Install and run anti-virus scans