Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

VOIP-Based Botnet Attacking Routers Configured With Default Password

Posted on July 26, 2025July 26, 2025 By CWS

A complicated world botnet marketing campaign focusing on VOIP-enabled routers and gadgets configured with default credentials. 

The invention started when analysts seen an uncommon cluster of malicious IP addresses concentrated in rural New Mexico, resulting in the identification of roughly 500 compromised gadgets worldwide.

Key Takeaways1. Hackers are exploiting VOIP routers with default Telnet passwords to construct world botnets.2. Traced ~90 compromised gadgets in rural New Mexico to 500+ contaminated methods worldwide.3. Organizations with VOIP methods face a direct risk from unpatched, internet-facing gadgets

Telnet Botnet Leveraging VoIP Gadgets

The investigation began when GreyNoise engineers detected ~90 malicious IP addresses originating from the Pueblo of Laguna Utility Authority in New Mexico, a area with simply over 3,000 residents. 

All visitors from these compromised methods was Telnet-based, exhibiting traits in line with botnet participation, together with “Telnet Bruteforcer,” “Generic IoT Default Password Try,” and “Mirai” tags.

Utilizing AI-powered evaluation via their Mannequin Context Protocol (MCP) server, researchers recognized a novel community fingerprint: JA4t signature 5840_2-4-8-1-3_1460_1, which represented 90% of the malicious visitors. 

This signature signifies comparable {hardware} configurations throughout compromised hosts, suggesting coordinated focusing on of particular system sorts.

The evaluation confirmed that many affected methods had been VoIP-enabled gadgets, with {hardware} from Cambium Networks possible concerned in parts of the marketing campaign. 

These gadgets usually run older Linux-based firmware with Telnet companies uncovered by default, making them engaging targets for risk actors.

Researchers additionally recognized roughly 500 IP addresses globally exhibiting comparable behavioral patterns. 

The compromised gadgets shared widespread traits: Telnet login makes an attempt utilizing weak or default credentials, excessive session volumes, and scanning conduct aligned with recognized Mirai botnet variants.

VOIP gadgets current notably engaging targets as a result of they’re often internet-facing, evenly monitored, and often patched. 

Some Cambium routers within the affected infrastructure should be operating firmware variations impacted by a distant code execution (RCE) vulnerability disclosed in 2017, although researchers couldn’t verify exploitation of that particular CVE.

The marketing campaign demonstrates how vulnerabilities stay a part of the assault floor lengthy after disclosure, with risk actors opportunistically focusing on methods wherever out there. 

When GreyNoise researchers briefly talked about the exercise on social media, visitors from the New Mexico utility fully ceased, solely to spike once more shortly afterward, suggesting attackers actively monitor safety group discussions.

Safety specialists advocate organizations instantly audit Telnet publicity on VOIP-enabled methods, rotate or disable default credentials on edge gadgets, and implement dynamic IP blocking to defend in opposition to these coordinated assaults.

Expertise sooner, extra correct phishing detection and enhanced safety for what you are promoting with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Attacking, Botnet, Configured, Default, Password, Routers, VOIPBased

Post navigation

Previous Post: How to Report a Stolen Identity
Next Post: Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities

Related Posts

Hackers Attacking Remote Desktop Protocol Services With 30,000+ New IP Addresses Daily Cyber Security News
Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload Cyber Security News
xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors Cyber Security News
New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content Cyber Security News
NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls Cyber Security News
Critical OpenSSH Vulnerability Exposes Moxa Ethernet Switches to Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks
  • Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
  • Microsoft Teams to Share your Location With Your Employer Soon Based on Wi-Fi Network
  • Nike Probing Potential Security Incident as Hackers Threaten to Leak Data
  • Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks
  • Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
  • Microsoft Teams to Share your Location With Your Employer Soon Based on Wi-Fi Network
  • Nike Probing Potential Security Incident as Hackers Threaten to Leak Data
  • Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark