Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Ukraine, second night drone attack under Russian missiles kills 12 people | News of the Russian-Ukraine War

Russia-Ukraine War: List of Major Events, Day 1,186 | News of the Russian-Ukraine War

Hackers deliver Winos 4.0 malware using fake VPN and browser NSIS installer

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » VisicorTrap uses Cisco flaws to build a global honeypot from 5,300 compromised devices
Identity

VisicorTrap uses Cisco flaws to build a global honeypot from 5,300 compromised devices

userBy userMay 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 23, 2025Ravi LakshmananThreat Intelligence/Network Security

Cybersecurity researchers have revealed that threat actors, known as the codename Visicotrap, have compromised nearly 5,300 unique network edge devices in 84 countries, turning them into honeypot-like networks.

Threat actors have been observed using critical security flaws affecting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 routers (CVE-2023-20118). The majority of the infections are in Macau, with 850 infringing devices.

“The infection chain involves running a shell script called Netghost, which allows you to intercept network flows by redirecting incoming traffic from a specific port on a compromised router to a honeypot-like infrastructure under the control of an attacker.”

Cybersecurity

It is noteworthy that the exploitation of CVE-2023-20118 was attributed to Polaredo, previously known as another botnet by French cybersecurity firms.

Although there is no evidence that these two sets of activity are connected, it is believed that the threat actors behind Viousictrap are likely to set up honeypot infrastructure by violating a wide range of internet-facing equipment, including Soho routers, SSL VPNs, DVRs, DVRs, Araknis Networks, and D-Link.

“This setup allows actors to observe attempts at exploitation across multiple environments, potentially collect private or zero-day exploits, and reuse access gained by other threat actors.”

The attack chain involves weaponization of CVE-2023-20118, download and run the BASH script via FTPGET, contacting an external server to get the WGET binaries. In the next step, the Cisco flaw is exploited a second time and uses it to run the second script obtained using the WGET that I previously dropped.

Netghost and internally referenced second-stage shell scripts are configured to redirect network traffic from compromised systems controlled by attackers to third-party infrastructure, thus facilitating middle school (AITM) attacks. It also has the ability to remove itself from compromised hosts to minimize forensic trails.

Sekoia said that all exploitation attempts came from a single IP address (“101.99.91[.]151”), in an early activity dating back to March 2025. At a notable event observed a month later, the malicious actor is said to have reused an undocumented webshell that had previously been employed in a Pola Red Botnet attack for his own manipulation.

Cybersecurity

“This assumption is consistent with the attacker’s use of netghosts,” said security researchers Felix Amile and Jeremy Sion. “The redirect mechanism can effectively place attackers as silent observers, collect exploitation attempts, and potentially collect web shell access during transit.”

As in this month, exploitation efforts are targeting ASUS routers, but from a different IP address (101.99.91)[.]239″), Threat actors are not known to create honeypots on infected devices, but all IP addresses actively used in the campaign are in Malaysia and are part of an autonomous system (AS45839) run by hosting provider Shinjiru.

The actor is thought to be of Chinese speaking origins based on the weak overlap with the Goblat infrastructure and the fact that traffic is redirected to numerous assets in Taiwan and the US.

“The ultimate purpose of ViciousTrap remains unknown [though] Sequoia concluded.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePersonal finance app Monarch raises $75 million
Next Article Most vaccine refrigerators on farms cannot keep cool, research finds
user
  • Website

Related Posts

Hackers deliver Winos 4.0 malware using fake VPN and browser NSIS installer

May 25, 2025

Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques

May 23, 2025

Discover the Importance of Fact-Checking: Empower Your Digital Self in the Age of Misinformation

May 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Ukraine, second night drone attack under Russian missiles kills 12 people | News of the Russian-Ukraine War

Russia-Ukraine War: List of Major Events, Day 1,186 | News of the Russian-Ukraine War

Hackers deliver Winos 4.0 malware using fake VPN and browser NSIS installer

Foreign universities want to seduce scientists from the US after Trump’s research has been cut

Trending Posts

Ukraine, second night drone attack under Russian missiles kills 12 people | News of the Russian-Ukraine War

May 25, 2025

Russia-Ukraine War: List of Major Events, Day 1,186 | News of the Russian-Ukraine War

May 25, 2025

Ecuador’s Daniel Novoa is sworn at expiry and promises to crack down on gangs | Election News

May 24, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Builder.ai, a Microsoft-backed AI startup, was once valued at $1.2 billion. Bankruptcy File: Will AI be in a different .com bubble?

Nitro Nation: Mythical Games, the first complete player-centric gaming platform from NFL rivals

Beyond Hype: 55% of Spanish Companies Prove AI’s Impact on Decisions

Prompt Killed Startups: How AI Will Be Launched Before Starting Running Founder’s Best Ideas

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.