• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Malware   »   Router-Compromising Malware in Latin America

Router-Compromising Malware in Latin America

  • Posted on:March 10, 2011 at 12:29 am
  • Posted in:Malware
  • Author:
    Erika Mendoza (Threat Response Engineer)
13

TrendLabsSM is currently taking a look at an interesting .ELF file that is actually an IRC backdoor program. We initially found some code suggesting that it performs brute-force attacks on router user name-password pairs.

This malware is predominantly found in Latin America but we are also checking the extent of infection in other regions. The attacks also work against D-LINK routers though we are also verifying if it works on others.

An infected system also connects to a botnet on IRC servers and is capable of receiving and executing commands. Trend Micro detects the offending code as ELF_TSUNAMI.R. Analysis is ongoing and we will be posting updates as new information is found.

There was an old attack in 2008 that targeted routers in Mexico, which we blogged about in the entry “Targeted Attack in Mexico: DNS Poisoning via Modems.”

Update as of March 11, 2011, 6:08 AM Pacific Time

  • ELF_TSUNAMI.R is MIPS-based (Microprocessor without Interlocked Pipeline Stages)—a processor typically used in small devices such as routers. The means as to how an attacker would be able to drop the said file into a router is not yet determined, but it is possible that the .ELF file is just a component of a much bigger threat.
  • It exploits a vulnerability that affects certain D-Link routers. Successful exploitation of the said vulnerability grants a remote attacker complete administrative access to the affected router.
  • It is also capable if disabling the firewall of the affected router by executing the command /etc/firewall_stop





ENTERPRISE »
SMALL BUSINESS»
HOME»

Featured Stories

  • Cybercrime Surpasses Traditional Crime in the United Kingdom
  • Why Ransomware Works: Arrival Tactics
  • ‘GODLESS’ Mobile Malware Uses Multiple Exploits to Root Devices
  • FLocker Mobile Ransomware Crosses to Smart TV
  • FastPOS: Quick and Easy Credit Card Theft

Business Email Compromise

  • How can a sophisticated email scam cause more than $2.3 billion in damages to businesses around the world?
    See the numbers behind BEC

Latest Ransomware Posts

  • R980 Ransomware Found Abusing Disposable Email Address Service
  • Can Internet of Things be the New Frontier for Cyber Extortion?
  • Economics Behind Ransomware as a Service: A Look at Stampado’s Pricing Model
  • CrypMIC Ransomware Wants to Follow CryptXXX’s Footsteps
  • How Endpoint Solutions Can Protect Businesses Against Ransomware

Recent Posts

  • R980 Ransomware Found Abusing Disposable Email Address Service
  • Can Internet of Things be the New Frontier for Cyber Extortion?
  • August Patch Tuesday: Nine Bulletins, Five Rated Critical
  • BlackHat2016: badWPAD – The Doubtful Legacy of the WPAD Protocol
  • Two-Factor Authentication and SMS Messages: Don’t Let The Perfect Be The Enemy Of The Good

Ransomware 101

  • This infographic shows how ransomware has evolved, how big the problem has become, and ways to avoid being a ransomware victim.
    Check the infographic

Popular Posts

  • Banking Trojans as a Service—Theft Made Easy in Brazil
  • Self-Promoting App in Google Play Cashes In on Pokémon Go
  • CrypMIC Ransomware Wants to Follow CryptXXX’s Footsteps
  • Flashlight App Spews Malicious Ads
  • ‘GODLESS’ Mobile Malware Uses Multiple Exploits to Root Devices

Latest Tweets

  • ICYMI: Nigerian national and his network of cybercriminals behind multiple #BEC, 419, and romance scams arrested. bit.ly/2b2ixHh
    about 2 hours ago
  • How strong are your passwords? Learn about #2FA, and why you need to enable it on your online accounts: bit.ly/2aNU3CI
    about 4 hours ago
  • Scammers bank on #PokemonGo’s massive popularity to promote their own apps: bit.ly/2aTfd1D
    about 1 day ago

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.