New BotenaGo Malware Variant Targeting Lilin Security Camera DVR Devices

BotenaGo Malware News

A new IoT botnet, BotenaGo, has appeared in the wild. It specifically targets Lilin security cameras DVRs to be infected with Mirai malware.

Dubbed “Lilin Scanner” by Nozomi Networks, the latest version is designed to exploit a two-year-old critical command injection vulnerability in the DVR firmware that was patched by the Taiwanese company in February 2020.

BotenaGo, first documented in November 2021 by AT&T Alien Labs, is written in Golang and features over 30 exploits for known vulnerabilities in web servers, routers and other kinds of IoT devices.

The botnet’s source codes have been posted to GitHub. This makes it open for other criminal actors. “With only 2,891 lines of code, BotenaGo has the potential to be the starting point for many new variants and new malware families using its source code,” the researchers said this year.

The new BotenaGo malware is the latest to exploit vulnerabilities in Lilin DVR devices after Chalubo, Fbot, and Moobot. Earlier this month, Qihoo 360’s Network Security Research Lab (360 Netlab) detailed a rapidly spreading DDoS botnet called Fodcha that has spread through different N-Day flaws and weak Telnet/SSH passwords.

BotenaGo Malware

One crucial aspect sets Lillin Scanner apart from BotenaGo is its reliance on an external program to build an IP address list of vulnerable Lilin devices, subsequently exploiting the aforementioned flaw to execute arbitrary code remotely on the target and deploy Mirai payloads.

It is important to note that this malware can not spread itself in a way that is worm-like and it cannot be used to attack the IP addresses entered with Mirai binaries.

” Another behavior that was associated with Mirai’s botnet is exclusion of IP ranges belonging the U.S. Department of Defense, U.S. Postal Service (USPS), General Electric (GE), Hewlett-Packard (HP), and others,” the researchers said.

Like Mirai, the emergence of Lilin Scanner points to the reuse of readily available source code to spawn new malware offshoots.

“Its authors removed almost all of the 30+ exploits present in BotenaGo’s original source code,” the researchers said, adding, “it seems that this tool has been quickly built using the code base of the BotenaGo malware. “

Rate author