Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

Mar 11, 2025Ravie LakshmananCommunity Safety / Vulnerability

Unpatched TP-Hyperlink Archer routers have grow to be the goal of a brand new botnet marketing campaign dubbed Ballista, based on new findings from the Cato CTRL crew.

“The botnet exploits a distant code execution (RCE) vulnerability in TP-Hyperlink Archer routers (CVE-2023-1389) to unfold itself mechanically over the Web,” safety researchers Ofek Vardi and Matan Mittelman mentioned in a technical report shared with The Hacker Information.

CVE-2023-1389 is a high-severity safety flaw impacting TP-Hyperlink Archer AX-21 routers that might result in command injection, which might then pave the way in which for distant code execution.

The earliest evidence of energetic exploitation of the flaw dates again to April 2023, with unidentified menace actors utilizing it to drop Mirai botnet malware. Since then, it has additionally been abused to propagate different malware households like Condi and AndroxGh0st.

Cybersecurity

Cato CTRL mentioned it detected the Ballista marketing campaign on January 10, 2025. The newest exploitation try was recorded on February 17.

The assault sequence entails using a malware dropper, a shell script (“dropbpb.sh”) that is designed to fetch and execute the primary binary on the goal system for numerous system architectures resembling mips, mipsel, armv5l, armv7l, and x86_64.

As soon as executed, the malware establishes an encrypted command-and-control (C2) channel on port 82 in an effort to take management of the machine.

“This enables working shell instructions to conduct additional RCE and denial-of-service (DoS) assaults,” the researchers mentioned. “As well as, the malware makes an attempt to learn delicate recordsdata on the native system.”

Ballista Botnet

A number of the supported instructions are listed beneath –

  • flooder, which triggers a flood assault
  • exploiter, which exploits CVE-2023-1389
  • begin, an non-obligatory parameter that’s used with the exploiter to begin the module
  • shut, which stops the module triggering operate
  • shell, which runs a Linux shell command on the native system.
  • killall, which is used to terminate the service

As well as, it is able to terminating earlier cases of itself and erasing its personal presence as soon as execution begins. It is also designed to unfold to different routers by making an attempt to take advantage of the flaw.

Cybersecurity

The usage of the C2 IP handle location (2.237.57[.]70) and the presence of Italian language strings within the malware binaries suggests the involvement of an unknown Italian menace actor, the cybersecurity firm mentioned.

That mentioned, it seems the malware is underneath energetic improvement provided that the IP handle is not useful and there exists a brand new variant of the dropper that makes use of TOR community domains as an alternative of a hard-coded IP handle.

A search on assault floor administration platform Censys reveals that more than 6,000 devices are contaminated by Ballista. The infections are concentrated round Brazil, Poland, the UK, Bulgaria, and Turkey.

The botnet has been discovered to focus on manufacturing, medical/healthcare, providers, and expertise organizations in the USA, Australia, China, and Mexico.

“Whereas this malware pattern shares similarities with different botnets, it stays distinct from broadly used botnets resembling Mirai and Mozi,” the researchers mentioned.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.

Leave a Reply