Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    eSIM tech flaw exposes smartphones to serious hacking risks

    July 18, 2025

    Solution Validation Services Matter More Than Ever Before

    July 18, 2025

    iPhone 17 Pro may get anti-reflective display glass

    July 18, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices
    IT/ Cybersecurity

    Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

    big tee tech hubBy big tee tech hubMarch 11, 2025003 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Mar 11, 2025Ravie LakshmananNetwork Security / Vulnerability

    Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

    Unpatched TP-Link Archer routers have become the target of a new botnet campaign dubbed Ballista, according to new findings from the Cato CTRL team.

    “The botnet exploits a remote code execution (RCE) vulnerability in TP-Link Archer routers (CVE-2023-1389) to spread itself automatically over the Internet,” security researchers Ofek Vardi and Matan Mittelman said in a technical report shared with The Hacker News.

    CVE-2023-1389 is a high-severity security flaw impacting TP-Link Archer AX-21 routers that could lead to command injection, which could then pave the way for remote code execution.

    The earliest evidence of active exploitation of the flaw dates back to April 2023, with unidentified threat actors using it to drop Mirai botnet malware. Since then, it has also been abused to propagate other malware families like Condi and AndroxGh0st.

    Cybersecurity

    Cato CTRL said it detected the Ballista campaign on January 10, 2025. The most recent exploitation attempt was recorded on February 17.

    The attack sequence entails the use of a malware dropper, a shell script (“dropbpb.sh”) that’s designed to fetch and execute the main binary on the target system for various system architectures such as mips, mipsel, armv5l, armv7l, and x86_64.

    Once executed, the malware establishes an encrypted command-and-control (C2) channel on port 82 in order to take control of the device.

    “This allows running shell commands to conduct further RCE and denial-of-service (DoS) attacks,” the researchers said. “In addition, the malware attempts to read sensitive files on the local system.”

    Ballista Botnet

    Some of the supported commands are listed below –

    • flooder, which triggers a flood attack
    • exploiter, which exploits CVE-2023-1389
    • start, an optional parameter that is used with the exploiter to start the module
    • close, which stops the module triggering function
    • shell, which runs a Linux shell command on the local system.
    • killall, which is used to terminate the service

    In addition, it’s capable of terminating previous instances of itself and erasing its own presence once execution begins. It’s also designed to spread to other routers by attempting to exploit the flaw.

    Cybersecurity

    The use of the C2 IP address location (2.237.57[.]70) and the presence of Italian language strings in the malware binaries suggests the involvement of an unknown Italian threat actor, the cybersecurity company said.

    That said, it appears the malware is under active development given that the IP address is no longer functional and there exists a new variant of the dropper that utilizes TOR network domains instead of a hard-coded IP address.

    A search on attack surface management platform Censys reveals that more than 6,000 devices are infected by Ballista. The infections are concentrated around Brazil, Poland, the United Kingdom, Bulgaria, and Turkey.

    The botnet has been found to target manufacturing, medical/healthcare, services, and technology organizations in the United States, Australia, China, and Mexico.

    “While this malware sample shares similarities with other botnets, it remains distinct from widely used botnets such as Mirai and Mozi,” the researchers said.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





    Source link

    Ballista Botnet Devices Exploits Infects TPLink Unpatched Vulnerability
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Fake Android Money Transfer App Targeting Bengali-Speaking Users

    July 17, 2025

    DP World Evyap: Smart Port Connectivity and Revolutionizing the Future of Trade

    July 17, 2025

    Zero Trust Explained: Why Traditional

    July 16, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    eSIM tech flaw exposes smartphones to serious hacking risks

    July 18, 2025

    Solution Validation Services Matter More Than Ever Before

    July 18, 2025

    iPhone 17 Pro may get anti-reflective display glass

    July 18, 2025

    Bridging the Digital Chasm: How Enterprises Conquer B2B Integration Roadblocks

    July 18, 2025
    Advertisement
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    eSIM tech flaw exposes smartphones to serious hacking risks

    July 18, 2025

    Solution Validation Services Matter More Than Ever Before

    July 18, 2025

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2025 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.