Several malware botnets actively target Cacti and Realtek vulnerabilities in projects discovered in between January and March 2023, spreading out ShellBot and Moobot malware.
The targeted defects are CVE-2021-35394, an important remote code execution vulnerability in Realtek Jungle SDK, and CVE-2022-46169, an important command injection defect in the Cacti fault management tracking tool.
Both defects have actually been made use of by other botnet malware in the past, consisting of Fodcha, RedGoBot, Mirai, Gafgyt, and Mozi.
Fortinet reports that the volume of the destructive activity in 2023 is considerable, targeting exposed network gadgets to employ them in DDoS (dispersed rejection of service) swarms.
While Fortinet’s report does not clearly state if the exact same risk stars spread out Moobot and ShellBot, payloads were observed making use of the exact same defects in overlapping attack bursts.
Moobot infections
Moobot, a version of Mirai, was very first found in December 2021, targeting Hikvision electronic cameras. In September 2022, it was upgraded to target numerous D-Link RCE defects.
Presently, it targets CVE-2021-35394 and CVE-2022-46169 to contaminate susceptible hosts, then downloads a script including its setup and develops a connection with the C2 server.
Moobot continues to exchange heart beat messages till it acknowledges an inbound command, which is when it starts its attack.
A significant function of brand-new Moobot variations is their capability to scan for and eliminate procedures of other recognized bots so that they can gather the optimum hardware power of the contaminated host to release DDoS attacks.
ShellBot attacks
ShellBot was very first found in January 2023 and continues to be active today, mainly targeting the Cacti defect. Fortinet caught 3 malware versions, showing that it is being actively established.
The very first alternative develops interaction with the C2 and waits for the reception of among the following commands:
- ps — carry out a port scan on the defined target and port
- nmap — carry out a Nmap port scan on a defined port variety
- rm — erase files and folders
- variation — send out variation details
- down — download a file
- udp — start UDP DDoS attack
- back — inject reverse shell
The 2nd version of ShellBot, which initially appeared in March 2023 and currently counts numerous victims, includes a far more comprehensive set of commands, as revealed listed below:

Remarkably, the malware includes a make use of improvement module that aggregates news and public advisories from PacketStorm and milw0rm.
The suggested action to resist Mootbot and ShellBot is to utilize strong administrator passwords and use the security updates that repair the pointed out vulnerabilities.
If your gadget is no longer supported by its supplier, it needs to be changed with a more recent design to get security updates.