Technology

Alarming Findings: Chinese Hackers Exploit Quad7 Botnet to Steal Sensitive Credentials

2024-10-31

Author: Daniel

In a shocking revelation, Microsoft has issued a warning that Chinese cybercriminals are leveraging the Quad7 botnet, which consists of compromised Small Office/Home Office (SOHO) routers, to conduct password-spray attacks aimed at stealing user credentials. This nefarious operation has implications far beyond mere theft, raising concerns over data security on a global scale.

Overview of the Quad7 Botnet

The Quad7 botnet, also known as CovertNetwork-1658 or xlogin, was first identified by the cybersecurity researcher Gi7w0rm. It consists primarily of hacked devices from popular brands, including TP-Link, ASUS, Ruckus, Axentra, and Zyxel. Researchers from Sekoia and Team Cymru have confirmed that these hackers specifically target a diverse range of networking devices, making this a widespread issue.

Method of Attack

Once these routers and devices are compromised, malicious actors deploy customized malware that enables remote access through Telnet, using unique banners to identify the device:

- **TP-Link routers** display the banner "xlogin" on TCP port 7777. - **ASUS routers** reveal "alogin" on TCP port 63256. - **Ruckus devices** show "rlogin" on TCP port 63210. - **Axentra NAS devices** display "axlogin" but the port remains unknown as it has not been publicly observed. - **Zyxel VPN appliances** are associated with the banner "zylogin" on TCP port 3256.

Blending with Legitimate Traffic

In addition to these vulnerabilities, hackers install a SOCKS5 proxy server to blend their attacks with legitimate network traffic, making detection significantly harder.

Threat Actor Insights

While the botnet has yet to be linked to a specific threat actor, Team Cymru tracked the proxy software back to a user based in Hangzhou, China. Microsoft emphasizes that multiple Chinese threat actors are engaging in credential theft via password-spray tactics—most notably, the actor known as Storm-0940 has been observed using the compromised credentials for unauthorized network access.

Cautious Tactics of Cybercriminals

“We’ve noticed these cybercriminals are strategically cautious; they limit their sign-in attempts to a few per account," Microsoft reports. "In fact, they make only one login attempt per account on about 80% of occasions, likely to avoid detection.” Once credentials are pilfered, Storm-0940 moves quickly to breach networks, sometimes on the same day of theft. Following the breach, they escalate their attacks by dumping credentials and installing Remote Access Trojans (RATs) for long-term access.

Motivation Behind Attacks

The ultimate motivation behind these attacks appears to be data exfiltration for purposes of cyber espionage. As these events unfold, experts are left puzzled about the methods Chinese hackers utilize to compromise these SOHO routers and additional networking devices. Notably, Sekoia has observed these hackers breaching their honeypots using a zero-day vulnerability in OpenWRT, indicating a rapidly evolving threat landscape.

Conclusion

While this information sheds light on a growing cyber threat, the precise techniques by which Quad7 actors infiltrate other devices remain largely unknown, highlighting an urgent need for enhanced cybersecurity measures and vigilance across all sectors. The implications of such cyber threats could be staggering—both for individual users and businesses alike. Stay informed and secure from these lurking dangers!