Skip to content
New Report: Get your copy of The 2024 State of the Internet Report! | Download Today
Blogs

Using Censys to Track the Murdoc Botnet Campaign Targeting AVTECH Cameras and Huawei Routers

A Mirai botnet variant named Murdoc has been actively targeting AVTECH cameras and Huawei HG532 routers in a mass campaign since at least July 2024, discovered by Qualys threat researchers. It leverages two known vulnerabilities to gain RCE and deploy malware on compromised devices:

  • CVE-2024-7029, an unpatchable command injection vulnerability affecting end-of-life AVTECH IP Cameras. This CVE has also been targeted by the Corona Mirai variant, which we reported on last year (https://censys.com/cve-2024-7029/)
  • CVE-2017-17215, an arbitrary command execution vulnerability in Huawei HG532 routers

Current Observations:

As of January 22, Censys scans reveal 221 Murdoc-infected hosts concentrated in Indonesia, the United States, and Taiwan. Other sources report numbers of over 1,300 infections, but these figures are likely an overestimation. They include “truncated” hosts and pseudoservices that respond on over 100+ open ports– behavior which exceeds reasonable standards and is likely not reflective of genuine hosts. 

93 of these show indications of being Mirai command-and-control (C2) servers that target other vulnerable devices to further distribute the malware. 

 

A compromised AVTECH camera acting as a Mirai C2

 

Censys Search query for Murdoc infected hosts: services.http.response.body:”murdoc_botnet” 

Censys Search query for Murdoc (Mirai) C2s: services.http.response.body:”murdoc_botnet”  and services.http.response.body:”$(echo -ne”

GreyNoise sensors have been picking up exploit attempts on both CVEs targeted by Murdoc, including 17 distinct malicious IPs targeting the AVTECH camera vulnerability and a whopping 37,796 malicious IPs targeting the Huawei HG532 router vulnerability. 

Malicious activity targeting CVE-2017-17215 in the last 10 days peaked on January 16, according to GreyNoise data 

There are still over 36,182 exposed AVTECH cameras on the internet. While not all are necessarily vulnerable to CVE-2024-7029, these devices are discontinued, no longer receive security updates, and should not be exposed to the public internet. 

What can be done?

It’s critical for organizations and individuals to secure these devices immediately, either by isolating them from external networks or replacing them with supported hardware.

IoCs:

References:

 

About the Author

The Censys Research Team

Similar Content

Back to Resources Hub
Attack Surface Management Solutions
Learn more