Hackers exploit flaws in Cacti, Realtek to deploy Moobot and ShellBot malware

Hackers exploit flaws in Cacti, Realtek to deploy Moobot and ShellBot malware

Various threat actors are exploiting vulnerabilities in Cacti servers and Realtek devices to infect the unpatched systems with Moobot (Perlbot) and ShellBot malware used for DDoS attacks.

The warning comes from researchers at Fortinet’s FortiGuard Labs who observed the attacks exploiting CVE-2021-35394 (Realtek) and CVE-2022-46169 (Cacti) in January and March 2023.

CVE-2022-46169 is a critical authentication bypass and command injection flaw in Cacti servers that allows an unauthenticated user to execute arbitrary code. The vulnerability exists due to insufficient authorization within the Remote Agent when handling HTTP requests with a custom Forwarded-For HTTP header. A remote non-authenticated attacker can send a specially crafted HTTP request to the affected instance and execute arbitrary OS commands on the server.

CVE-2021-35394 is a command injection vulnerability in Realtek Jungle SDK, which stems from improper input validation within the MP Daemon diagnostic tool. The flaw allows a remote unauthenticated attacker execute arbitrary OS commands on the target system. The vulnerability has been previously exploited to distribute botnets like Mirai, Gafgyt, Mozi, and RedGoBot, however, this marks the first time CVE-2021-35394 has been used by Moobot, a Mirai variant botnet that targets exposed networking devices.

“Over the past few months, threat actors have been spreading ShellBot and Moobot malware on exploitable servers. Compromised victims can be controlled and used as DDoS bots after receiving a command from a C2 server. Because Moobot can kill other botnet processes and also deploy brute force attacks, administrators should use strong passwords and change them periodically. Moreover, some of the ShellBot variants can install other malware from their C2 server,” Fortinet notes.

Due to the severity of the above mentioned flaws, the cybersecurity recommends that users applied relevant patches and updates as soon as possible to protects their systems from attacks.

Back to the list

Latest Posts

Let’s Encrypt ends expiration notification emails, citing privacy, cost, and complexity

Let’s Encrypt ends expiration notification emails, citing privacy, cost, and complexity

The organization says the decision to discontinue expiration emails is driven by rising operational costs, increasing privacy concerns, and efforts to simplify its infrastructure.
30 June 2025
UAC-0226 upgrades Giftedcrook malware for intelligence gathering on Ukraine

UAC-0226 upgrades Giftedcrook malware for intelligence gathering on Ukraine

V1.3 comes with expanded ability to exfiltrate a wide range of sensitive files.
30 June 2025
Crypto investment fraud ring dismantled in Spain after defrauding 5K victims worldwide

Crypto investment fraud ring dismantled in Spain after defrauding 5K victims worldwide

The Guardia Civil arrested five individuals who are believed to be key members of the international criminal network.
30 June 2025