SYMBOLCOMMON_NAMEaka. SYNONYMS

Nexus Zeta  (Back to overview)


Nexus Zeta is no stranger when it comes to implementing SOAP related exploits. The threat actor has already been observed in implementing two other known SOAP related exploits, CVE-2014–8361 and CVE-2017–17215 in his Satori botnet project. A third SOAP exploit, TR-069 bug has also been observed previously in IoT botnets. This makes EDB 38722 the fourth SOAP related exploit which is discovered in the wild by IoT botnets.


Associated Families
elf.masuta

References
2018-01-23NewSky SecurityNewSky Security
@online{security:20180123:masuta:3bd95d1, author = {NewSky Security}, title = {{Masuta: Satori Creators' Second Botnet Weaponizes A New Router Exploit}}, date = {2018-01-23}, organization = {NewSky Security}, url = {https://blog.newskysecurity.com/masuta-satori-creators-second-botnet-weaponizes-a-new-router-exploit-2ddc51cc52a7}, language = {English}, urldate = {2020-01-07} } Masuta: Satori Creators' Second Botnet Weaponizes A New Router Exploit
Masuta Nexus Zeta
2018-01-23ThreatpostTom Spring
@online{spring:20180123:satori:f08d827, author = {Tom Spring}, title = {{Satori Author Linked to New Mirai Variant Masuta}}, date = {2018-01-23}, organization = {Threatpost}, url = {https://threatpost.com/satori-author-linked-to-new-mirai-variant-masuta/129640/}, language = {English}, urldate = {2020-01-13} } Satori Author Linked to New Mirai Variant Masuta
Masuta
2018Qihoo 360 TechnologyYa Liu, Hui Wang
@online{liu:2018:tracking:2ca5e73, author = {Ya Liu and Hui Wang}, title = {{Tracking Mirai variants (Appendix: Hashes)}}, date = {2018}, organization = {Qihoo 360 Technology}, url = {https://www.virusbulletin.com/virusbulletin/2018/12/vb2018-paper-tracking-mirai-variants/#h2-appendix-sample-sha256-hashes}, language = {English}, urldate = {2019-11-27} } Tracking Mirai variants (Appendix: Hashes)
Masuta

Credits: MISP Project