Key Takeaways
A new Mirai variant malware, dubbed ShadowV2, is actively exploiting a range of vulnerabilities in Internet of Things (IoT) devices. The malware was observed spreading during a global AWS outage at the end of October, leading researchers to believe the activity was a test run for future large-scale attacks.
ShadowV2 is a Mirai-based botnet designed specifically for IoT architectures. Analysis reveals that its structure is similar to that of another Mirai variant, LZRD.
A new FortiGuard Labs report revealed the campaign leverages a downloader script, binary.sh, to deliver the main payload by exploiting known security flaws in devices from several vendors, including:
Upon execution, the malware decodes its configuration and connects to a command-and-control (C2) server, silverpath[.]shadowstresser[.]info, to receive commands.
The malware is equipped to launch various Distributed Denial-of-Service (DDoS) attacks, supporting UDP and TCP floods as well as HTTP-level attacks.
The identification of the string "ShadowV2 Build v1.0.0 IoT version" in the code suggests this is a first-generation build developed specifically to compromise and weaponize IoT devices.
The ShadowV2 campaign demonstrates a significant global IoT security threat, with active exploitation attempts detected worldwide that impact devices in dozens of countries across North and South America, Europe, Africa, Asia, and Oceania, spanning industries such as technology, retail, manufacturing, government, and telecommunications.
The strategic exploitation of IoT device vulnerabilities underscores the critical need for organizations to maintain timely firmware updates and enforce robust security practices to mitigate the risk of being co-opted into a botnet.
In other recent news, a critical TP-Link zero-day vulnerability exposes millions of routers to full system takeover.
Among other news regarding IoT security threats, popular Android TV streaming boxes were linked to botnet activity. In August, the Gayfemboy botnet resurfaced with enhanced evasion tactics, targeting global routers.