Close Menu
AI Security Weekly
  • Artificial Intelligence
  • Cybersecurity
  • Threats & Breaches
  • Privacy & Policy
  • Tools
  • Trends & Research
  • MSP MSSP
  • Blogs & Insights

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
AI Security WeeklyAI Security Weekly
Subscribe
  • Artificial Intelligence
  • Cybersecurity
  • Threats & Breaches
  • Privacy & Policy
  • Tools
  • Trends & Research
  • MSP MSSP
  • Blogs & Insights
AI Security Weekly
Home » Old D-Link Vulnerabilities Open Doors for Global Attacks by FICORA and Kaiten Botnets
Threats and Breaches

Old D-Link Vulnerabilities Open Doors for Global Attacks by FICORA and Kaiten Botnets

ContributorBy ContributorMay 2, 2025No Comments2 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Old d link vulnerabilities open doors for global attacks by ficora
Share
Facebook Twitter LinkedIn Pinterest Telegram Email

Dec 27, 2024Ravie Lakshmanan
Botnet / DDoS Attack

Surge in Botnet Activity Targeting D-Link Routers

Researchers in cybersecurity are sounding alarms about a recent increase in malicious activities involving the enlistment of vulnerable D-Link routers into two distinct botnets: a variant of Mirai referred to as FICORA and a Kaiten variant known as CAPSAICIN.

Exploitation of HNAP Vulnerabilities

Vincent Li, a researcher from Fortinet FortiGuard Labs, noted in a Thursday analysis that these botnets commonly utilize known vulnerabilities in D-Link devices. Attackers exploit a flaw in the Home Network Administration Protocol (HNAP) interface, allowing them to execute harmful commands through a GetDeviceSettings request.

Historical Context of Security Flaws

The vulnerabilities exploited in these attacks have been recognized for nearly ten years, affecting a multitude of devices with various CVE numbers, such as CVE-2015-2051, CVE-2019-10891, CVE-2022-37056, and CVE-2024-33112.

Global Reach of FICORA and CAPSAICIN Attacks

Fortinet’s telemetry data indicates that attacks involving FICORA have been globally widespread, whereas CAPSAICIN has predominantly targeted regions in East Asia, including Japan and Taiwan. Notably, CAPSAICIN activity experienced intense peaks on October 21 and 22, 2024.

Operational Mechanism of the Botnets

The FICORA botnet operates by executing a downloader shell script, which retrieves the main payload tailored for various Linux architectures using common protocols such as wget, ftpget, curl, and tftp. This malware incorporates a brute-force attack function with a predefined list of usernames and passwords designed to maximize its effectiveness.

CAPSAICIN’s Command Structure

The downloader script for CAPSAICIN uses a different IP address, mirroring FICORA’s approach to ensure compatibility across multiple Linux systems. Once infiltrated, CAPSAICIN awaits further directives to undertake various malicious operations, including command executions for information gathering and launching DDoS attacks against specified targets.

Importance of Ongoing Device Maintenance

Despite the vulnerabilities being publicly addressed and patched almost ten years ago, ongoing attacks utilizing these exploits continue globally. Li emphasized the necessity for enterprises to consistently update their devices’ software and implement robust monitoring practices to mitigate risks.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
Attacks Botnets DLink Doors FICORA Global Kaiten Open Vulnerabilities
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
contact
Contributor

Related Posts

Essential Insights on Cybersecurity Threats, Tools, and Best Practices

May 5, 2025

Essential Cybersecurity Threats, Strategies, and Insights

May 5, 2025

Targets in Russia Exceed 80% Success Rate

May 2, 2025

Treasury Cyber Attack: Ongoing Investigation with Limited Federal Impact

May 1, 2025

RedDelta Unleashes PlugX Malware in Espionage Efforts Targeting Mongolia and Taiwan

April 28, 2025

U.S. Sanctions Chinese Cybersecurity Firm Linked to Treasury Hack

April 27, 2025
Leave A Reply Cancel Reply

Top Reviews
We're Social
  • Facebook
  • Twitter
  • Instagram
  • LinkedIn
Editors Picks

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025

Creating a Trust Layer for AI and Web3: Insights from Polyhedra

May 15, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

About Us
About Us

At AI Security Weekly, we are dedicated to delivering the latest news, insights, and analysis on artificial intelligence security. As AI technologies continue to evolve, so do the threats, vulnerabilities, and solutions that shape the cybersecurity landscape. Our mission is to keep security professionals, researchers, and tech enthusiasts informed about the rapidly changing world of AI-driven security risks and defenses.

Trends

Crafting a Robust SOC Automation Plan

May 15, 2025

Sophos Launches MSP Elevate to Drive Partner Success

May 15, 2025

ManageEngine Unveils AI Innovations for Enhanced PAM Solutions

May 11, 2025
Don't Miss

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025
© 2025 AI Security Weekly. All Rights Reserved.
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.