Mirai Botnet Variant Exploits Four-Faith Router Flaw to Unleash DDoS Attacks
In a stark reminder of the growing dangers posed by botnets, a new Mirai variant has been exploiting vulnerabilities in Four-Faith industrial routers since early November 2024. This latest botnet, dubbed “gayfemboy” (a term derived from its offensive source code references), highlights the persistent threat of distributed denial-of-service (DDoS) attacks and underscores the need for robust cybersecurity defenses.
With 15,000 daily active IPs spread across regions such as China, Iran, Russia, Turkey, and the U.S., this botnet has scaled to devastating proportions. Its ability to leverage both zero-day vulnerabilities and a laundry list of over 20 known security flaws is a wake-up call for enterprises and individual users alike.
Table of Contents
The Exploited Vulnerability: CVE-2024-12856
At the heart of the botnet’s recent campaign is CVE-2024-12856, a command injection vulnerability affecting Four-Faith router models F3x24 and F3x36. The flaw, which has a CVSS score of 7.2, allows attackers to exploit routers configured with unchanged default credentials.
Since its discovery in November 2024, this vulnerability has been actively exploited to deliver malicious payloads, including reverse shells and a Mirai-based malware variant. By targeting industrial-grade routers, attackers can leverage highly connected devices, amplifying their botnet's reach and effectiveness.
A Multi-Pronged Attack Strategy
The Mirai variant employs a combination of tactics to infect devices and maximize its impact:
- Initial Access via Weak Credentials
The botnet scans for devices with weak Telnet credentials or factory-default settings, a common security oversight in many IoT and industrial systems. - Exploiting a Long List of Vulnerabilities
Beyond CVE-2024-12856, the botnet exploits over 20 additional vulnerabilities, including flaws dating back to 2013, such as:- CVE-2013-3307
- CVE-2016-20016
- CVE-2021-35394
- Mirai-Based Malware Capabilities
Once deployed, the malware adopts techniques to:- Hide malicious processes.
- Execute commands to locate new vulnerable devices.
- Continuously update its malware payload.
- Launch targeted DDoS attacks.
The Scale and Impact of the Attacks
The botnet has orchestrated daily DDoS attacks on hundreds of targets, achieving bandwidth peaks of 100 Gbps. Although these attacks often last just 10 to 30 seconds, the sudden influx of traffic can overwhelm servers, disrupt services, and inflict significant damage.
Notably, October and November 2024 saw a surge in botnet activity, with the malware aggressively scanning for and compromising devices.
The Broader Botnet Threat
This latest Mirai variant is part of a larger trend of cybercriminals exploiting vulnerabilities in IoT and industrial devices to build botnets. Similar campaigns include:
- Juniper Networks Warning: Malicious actors targeting Session Smart Router (SSR) products with default passwords to spread Mirai malware.
- Akamai Report: Mirai infections weaponizing remote code execution flaws in DigiEver DVRs.
These incidents reflect a troubling reality: as devices remain misconfigured or unpatched, attackers will continue to exploit them to grow their botnet armies.
How to Protect Against Mirai Botnets and DDoS Attacks
Given the persistent and evolving threat of Mirai-based botnets, it is critical for organizations and users to adopt comprehensive security measures:
- Change Default Credentials
Replace factory-default passwords on all devices with strong, unique credentials. - Patch and Update Devices Regularly
Keep router firmware and software updated to mitigate known vulnerabilities like CVE-2024-12856. - Implement Network Segmentation
Isolate IoT and industrial devices from critical networks to limit lateral movement. - Monitor for Unusual Traffic
Use intrusion detection systems (IDS) and anomaly-based monitoring tools to detect unusual traffic patterns indicative of DDoS activity. - Deploy Anti-DDoS Solutions
Cloud-based DDoS protection can absorb and mitigate high-bandwidth attacks before they reach your network. - Limit Telnet and Remote Access
Disable Telnet access and restrict remote management interfaces to trusted IPs only.
DDoS Threats Are Evolving
The latest Mirai botnet variant is more than just another malware strain—it’s a harbinger of the increasing sophistication of DDoS threats. By exploiting vulnerabilities in industrial routers and IoT devices, attackers are creating botnets with greater reach and destructive potential.
To stay ahead of these threats, organizations and individuals must remain vigilant, secure their devices, and adopt proactive cybersecurity practices. As this campaign demonstrates, even seemingly minor vulnerabilities can have a massive impact if left unaddressed.








