Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Trump administration’s sanctions on Harvard international students hurt global appeal

Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques

US judge blocks Trump’s efforts to ban Harvard University from registering foreign students | Education News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » VisicorTrap uses Cisco flaws to build a global honeypot from 5,300 compromised devices
Identity

VisicorTrap uses Cisco flaws to build a global honeypot from 5,300 compromised devices

userBy userMay 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 23, 2025Ravi LakshmananThreat Intelligence/Network Security

Cybersecurity researchers have revealed that threat actors, known as the codename Visicotrap, have compromised nearly 5,300 unique network edge devices in 84 countries, turning them into honeypot-like networks.

Threat actors have been observed using critical security flaws affecting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 routers (CVE-2023-20118). The majority of the infections are in Macau, with 850 infringing devices.

“The infection chain involves running a shell script called Netghost, which allows you to intercept network flows by redirecting incoming traffic from a specific port on a compromised router to a honeypot-like infrastructure under the control of an attacker.”

Cybersecurity

It is noteworthy that the exploitation of CVE-2023-20118 was attributed to Polaredo, previously known as another botnet by French cybersecurity firms.

Although there is no evidence that these two sets of activity are connected, it is believed that the threat actors behind Viousictrap are likely to set up honeypot infrastructure by violating a wide range of internet-facing equipment, including Soho routers, SSL VPNs, DVRs, DVRs, Araknis Networks, and D-Link.

“This setup allows actors to observe attempts at exploitation across multiple environments, potentially collect private or zero-day exploits, and reuse access gained by other threat actors.”

The attack chain involves weaponization of CVE-2023-20118, download and run the BASH script via FTPGET, contacting an external server to get the WGET binaries. In the next step, the Cisco flaw is exploited a second time and uses it to run the second script obtained using the WGET that I previously dropped.

Netghost and internally referenced second-stage shell scripts are configured to redirect network traffic from compromised systems controlled by attackers to third-party infrastructure, thus facilitating middle school (AITM) attacks. It also has the ability to remove itself from compromised hosts to minimize forensic trails.

Sekoia said that all exploitation attempts came from a single IP address (“101.99.91[.]151”), in an early activity dating back to March 2025. At a notable event observed a month later, the malicious actor is said to have reused an undocumented webshell that had previously been employed in a Pola Red Botnet attack for his own manipulation.

Cybersecurity

“This assumption is consistent with the attacker’s use of netghosts,” said security researchers Felix Amile and Jeremy Sion. “The redirect mechanism can effectively place attackers as silent observers, collect exploitation attempts, and potentially collect web shell access during transit.”

As in this month, exploitation efforts are targeting ASUS routers, but from a different IP address (101.99.91)[.]239″), Threat actors are not known to create honeypots on infected devices, but all IP addresses actively used in the campaign are in Malaysia and are part of an autonomous system (AS45839) run by hosting provider Shinjiru.

The actor is thought to be of Chinese speaking origins based on the weak overlap with the Goblat infrastructure and the fact that traffic is redirected to numerous assets in Taiwan and the US.

“The ultimate purpose of ViciousTrap remains unknown [though] Sequoia concluded.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePersonal finance app Monarch raises $75 million
Next Article Most vaccine refrigerators on farms cannot keep cool, research finds
user
  • Website

Related Posts

Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques

May 23, 2025

Discover the Importance of Fact-Checking: Empower Your Digital Self in the Age of Misinformation

May 23, 2025

300 servers and 3.5 million euros have been seized as Europol attacks ransomware networks worldwide

May 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Trump administration’s sanctions on Harvard international students hurt global appeal

Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques

US judge blocks Trump’s efforts to ban Harvard University from registering foreign students | Education News

Following Trump’s ban on foreign students, the Belgian princess questioned her Harvard future

Trending Posts

US judge blocks Trump’s efforts to ban Harvard University from registering foreign students | Education News

May 23, 2025

Trump threatens 50% tariffs in the EU, 25% with Apple, ratchets trade war | Trade War News

May 23, 2025

Pakistan and Afghanistan move towards “recovery of tie” in talks with China | Taliban News

May 23, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Prices hit $3,500 as Apple faces a 25% tariff threat on iPhones not made in the US

Venom Foundation achieves 150k TPS in closed network stress tests, paving the way for mainnet upgrades in 2025

Discover the Importance of Fact-Checking: Empower Your Digital Self in the Age of Misinformation

B2Broker launches its first turnkey liquidity provider solution

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.