RapperBot Targets DVRs to Hijack Surveillance Cameras and Record Video

RapperBot Targets DVRs to Hijack Surveillance Cameras and Record Video

When the NICT CSRI analysis team presented their three-year investigation into the RapperBot virus at Botconf 1, an international conference on botnets and malware hosted in Angers, France in May 2025, they made a startling discovery.

This Mirai variant has evolved into a sophisticated threat specifically targeting Digital Video Recorders (DVRs), devices connected to surveillance cameras for remote video recording and control.

Unveiling a Persistent Threat to IoT Security

The team’s findings, detailed in their presentation “Unveiling the DVR Ecosystem: A 3-Year Investigation into Global IoT Bot Recruitment Campaigns.”

– Advertisement –

It highlight how DVRs’ inherent vulnerabilities such as weak default passwords, open Telnet or HTTP ports on older devices, and infrequent firmware updates make them prime targets for cyber attackers aiming to infiltrate and exploit Internet of Things (IoT) ecosystems.

RapperBot employs a multi-pronged approach to compromise DVRs, utilizing brute force login attacks with credential lists where 40% are DVR-specific, alongside exploiting known Common Vulnerabilities and Exposures (CVEs) and zero-day vulnerabilities through administrative interfaces.

RapperBot
RapperBot Infection Chain

Sophisticated Attack Strategies

A notable aspect of RapperBot’s strategy, as observed in NICTER darknet monitoring data from October to December 2024, is its use of Recon-type scanners to identify device types post-login, relaying information to a report server before a tailored Loader exploits specific vulnerabilities.

This intricate infection chain, which ultimately installs malware via a download server, complicates efforts to analyze and mitigate zero-day attacks since attackers often verify device responses to avoid honeypot detection.

Furthermore, RapperBot’s impact extends beyond infiltration, as it orchestrates Distributed Denial of Service (DDoS) attacks globally, with a notable assault on the social media platform X on March 10, 2025 (UTC), correlating with service disruptions as per Cisco ThousandEyes Availability plots.

RapperBot
DDoS attack on X

Recent updates between March and April 2025 introduced encrypted C2 server name resolution using 32 random FQDNs on public DNS and added HTTPS-based DDoS capabilities, blending malicious traffic with normal web activity by randomizing TLS signature algorithms to evade fingerprint detection like JA4.

According to the Report, The malware’s ability to target DVRs from manufacturers like ITX Security and CTRing, often sold under over 28 OEM brands, underscores the challenge of comprehensive vulnerability management, compounded by market fragmentation.

In a 2022 collaboration with a domestic retailer, NICT uncovered four vulnerabilities, including two zero-days, in ITX Security DVRs, leading to patched firmware an example of the proactive measures needed.

As RapperBot continues to evolve, with variants categorized by scanner implementation (Recon, Telnet, SSH, and No Scan), the NICT CSRI team pledges ongoing analysis and collaboration with distributors and research bodies to enhance end-user awareness and bolster IoT security against such persistent botnet threats.

Indicators of Compromise (IoC)

RapperBot Version Type SHA256
February 2025 No Scan 7e536cc15ebac6dbbf8e597dc41a20fac460c892cb5488849ed221a6b352f6a6
February 2025 Telnet ae3d740fc5a9fac12d1ef7c9204a0e25574d095a803baa988e093b8f577fb3bc
February 2025 SSH cc022c57fe74fbb9cc58ea57a4e1debe70fbc5f589b4f2f1987f36989eb4cc85
February 2025 Recon d822048a8eb925046edc4e5e72c41d82c56093dd87bb22f49685326d85986769
April 2025 No Scan 200e571bc0a6d2562563022dfcc60ac5ac8c2e40eb73a053be8555349a674a69

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates


Source link