Botnets, D-Link Routers, And Steps For Organizational Security

Two botnets, Ficora and Capsaicin, have recently intensified their attacks on outdated and end-of-life D-Link routers by exploiting multiple known vulnerabilities, including CVE-2015-2051, CVE-2019-10891, CVE-2022-37056, and CVE-2024-33112.

These malware variants specifically target popular D-Link models such as DIR-645, DIR-806, GO-RT-AC750, and DIR-845L, gaining initial access through weaknesses in the routers' management interface and executing malicious commands. After compromising a device, attackers use the access for data theft and launch distributed denial-of-service (DDoS) attacks.

Ficora is a modern offshoot of the Mirai botnet, built to exploit D-Link devices with a focus on wide geographic targeting but notable surges in Japan and the United States. Once inside, Ficora deploys a shell script named 'multi' that can download its payload using methods like wget, curl, ftpget, and tftp. It also features a brute-force mechanism with hard-coded credentials, enabling it to infect other Linux devices across different hardware architectures. For attack capabilities, Ficora supports UDP flooding, TCP flooding, and DNS amplification to boost the impact of its DDoS operations.

Capsaicin, a Kaiten botnet variant believed to be developed by the Keksec group, was observed in a concentrated burst of attacks mostly targeting East Asian countries over two days in October. Infection is initiated through a downloader script ("bins.sh") that fetches platform-specific binaries labeled with the 'yakuza' prefix. Aside from launching DDoS attacks, Capsaicin scans for other botnet payloads operating on the same device and disables them. It also collects host information and transmits it back to a command-and-control server.

Source: https://www.bleepingcomputer.com/news/security/malware-botnets-exploit-outdated-d-link-routers-in-recent-attacks/

Commentary

Botnets are automated networks of compromised devices controlled by malicious actors to carry out tasks such as distributed denial-of-service attacks, data theft, and the spread of malware. Their operation typically relies on infecting internet-connected devices - often those with security flaws or outdated firmware - so attackers can remotely coordinate large-scale, disruptive campaigns.

D-Link devices, particularly Wi-Fi routers, are integral parts of many organizations' infrastructures, offering affordable and reliable connectivity options. As a major player in the global router market, D-Link holds a significant market share, with estimates in recent years showing their routers account for about 10 percent of worldwide unit shipments and revenue.

Their portfolio ranges from consumer-grade models to enterprise solutions, making them a trusted but sometimes vulnerable choice in the midst of growing digital transformation.

The prevalence of D-Link routers within organizations is because of both widespread adoption and the expansion of wireless networks to support remote work, cloud services, and increasing device counts. Unfortunately, this popularity has made D-Link units a frequent target for botnet operators.

Given evolving threats, organizations must prioritize firmware updates for all network hardware and replace end-of-life devices that no longer receive security patches. Strong, unique passwords for administrative access, disabling unnecessary remote management features, and considering other firmware alternatives are also important.

The final takeaway is that maintaining vigilance over router security and lifecycle is essential for mitigating the risk of botnet infection and safeguarding both organizational resources and sensitive data.

Additional Sources: https://www.kbvresearch.com/router-market/; https://www.cognitivemarketresearch.com/articles/which-are-the-top-manufacturing-companies-of-wi-fi-routers-market; https://www.globaldata.com/company-profile/d-link-corporation/

Finally, your opinion is important to us. Please complete the opinion survey:

What's New

Botnets, D-Link Routers, And Steps For Organizational Security

We explain how botnets operate, why D-Link devices are vulnerable and remain common in business environments, and what actions IT teams should prioritize to defend their networks.

Two-Factor Authentication: No Longer Infallible Because Of Human Error

At one time, two-factor authentication was viewed as the means to protect data from human negligence. An FBI warning suggests that is no longer the case. We examine.

Proactive Next Steps Organizations Should Consider After A Ransomware Attack

A tech distributor suffers a ransomware attack. We examine what happened, but also what organizations can learn from the attack.

Latest Numbers

  • Unemployment Rate
    4.3% in Aug 2025
  • Payroll Employment
    +22,000(p) in Aug 2025
  • Average Hourly Earnings
    +$0.10(p) in Aug 2025
  • Employment Cost Index (ECI)
    +0.9% in 2nd Qtr of 2025
  • Productivity
    +3.3%(r) in 2nd Qtr of 2025

Source: Department of Labor