The US Federal Bureau of Investigation (FBI) issued a warning that HiatusRAT malware is actively scanning for and compromising vulnerable web cameras and digital video recorders (DVRs) connected to the internet.
Experts noticed that threat actors mainly focus on Chinese-branded IoT devices, exploiting known vulnerabilities or leveraging weak default passwords to breach systems.
In a private industry notification (PIN) yesterday, the FBI described the attackers’ modus operandi and their predilection towards devices from certain manufacturers.
The malicious campaign especially affects internet-connected devices that remain unpatched or have reached end-of-life status.
“In March 2024, HiatusRAT actors conducted a scanning campaign targeting Internet of Things (IoT) devices in the US, Australia, Canada, New Zealand, and the United Kingdom,” reads the FBI’s PIN. “They used Ingram—a webcam-scanning tool available on Github—to conduct scanning activity. And they used Medusa—an open-source brute-force authentication cracking tool—to target Hikvision cameras with telnet access. Targeted TCP ports have included: 23, 26, 554, 2323, 567, 5523, 8080, 9530, and 56575.”
According to the FBI, HiatusRAT operators exploited multiple vulnerabilities, including:
The FBI’s security advisory offers tips for network defenders to protect against the ongoing HiatusRAT threat, including:
The FBI also urged system administrators and cybersecurity professionals to report suspected breaches to the Internet Crime Complaint Center (IC3) or their local FBI field office.
tags
Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.
View all posts