The new Necro Python exploit targets Visual Tool DVRs used in surveillance systems.
Threat group FreakOut’s Necro botnet has developed a new trick: infecting Visual Tools DVRs with a Monero miner.
Juniper Threat Labs researchers have issued a report detailing new activities from FreakOut, also known as Necro Python and Python.IRCBot. In late September, the team noticed that the botnets started to target Visual Tools DVR VX16 126.96.36.199 models with cryptomining attacks. The devices are typically deployed as part of a professional-quality surveillance system.
A command injection vulnerability was found in the same devices last July. Visual Tools has not yet responded to Threatpost’s request for comment.
“The script can run in both Windows and Linux environments,” the Juniper report said. “The script has its own polymorphic engine to morph itself every execution which can bypass signature-based defenses. This works by reading every string in its code and encrypting it using a hardcoded key.”
FreakOut has been on the scene since at least January, exploiting recently identified and unpatched vulnerabilities to launch distributed denial-of-service (DDoS) and cryptomining attacks. Juniper reports that the threat actors have developed several iterations of the Necro bot, making steady improvements in its performance and persistence over the past several months.
“We have noted a few changes on this bot from the previous version,” the report said. “First, it removed the SMB scanner which was observed in the May 2021 attack. Second, it changed the url that it injects to script files on the compromised system.”
New DGA Functionality Helps Evade Detection
The team explained that more recent versions of the Necro bot scrapped its previous reliance on a hardcoded URL for a domain generation algorithm (DGA) for added persistence.
First the Necro bot scans for the target port: [22, 80, 443, 8081, 8081, 7001]. If detected, it will launch a XMRig – that’s a high-performance Monero (XMR) miner – linked to this wallet:
The team added that the bot is also still actively trying to exploit these previously identified vulnerabilities:
- CVE-2020-15568 – TerraMaster TOS before 4.1.29
- CVE-2021-2900 – Genexis PLATINUM 4410 2.1 P4410-V2-1.28
- CVE-2020-25494 – Xinuos (formerly SCO) Openserver v5 and v6
- CVE-2020-28188 – TerraMaster TOS <= 4.2.06
- CVE-2019-12725 – Zeroshell 3.9.0
Mounir Hahad, head of Juniper Threat Labs, told Threatpost that security teams need security that’s equipped to handle DGA domain attempts.
“The very existence of this kind of botnet highlights the need for a connected security approach where DNS security capabilities on the network identify connection attempts to DGA domains behind public dynamic DNS services, as well as routers, switches, and firewalls that are capable of immediately isolating the compromised host from the rest of the network,” Hahad said.