Description

The FBI has issued a warning regarding new HiatusRAT malware attacks targeting vulnerable web cameras and DVRs that are exposed online. The attackers primarily focus on unpatched or end-of-life IoT devices, particularly Chinese-branded Hikvision and Xiongmai models, exploiting known vulnerabilities such as CVE-2017-7921, CVE-2018-9995, CVE-2020-25078, CVE-2021-33044, and CVE-2021-36260, along with weak vendor-supplied credentials. Leveraging tools like Ingram for vulnerability scanning and Medusa for brute-forcing authentication, the actors search for devices with exposed ports, including 23, 26, 554, 2323, 567, 5523, 8080, 9530, and 56575. This campaign spans the United States, Australia, Canada, New Zealand, and the United Kingdom. The FBI recommends isolating or limiting the usage of vulnerable devices to prevent breaches or lateral movement within networks. Administrators and cybersecurity professionals are urged to report indications of compromise to the FBI. The ongoing campaign follows previous attacks involving DrayTek Vigor VPN routers, which were exploited to build covert proxy networks for command-and-control communication. Lumen researchers discovered that HiatusRAT enables further payload deployment and converts infected devices into SOCKS5 proxies for obfuscating malicious activities.xx HiatusRAT’s focus on web cameras and DVRs aligns with strategic objectives tied to Chinese state interests, as highlighted in the U.S. intelligence community's 2023 threat assessment. These attacks underscore the growing risks associated with unsecured IoT devices and highlight the need for timely patching and strong authentication practices to mitigate exploitation.