Technical News and Reports about Quad 7 (7777) Botnet aka CovertNetwork-1658

Security Advisory
Updated 02-11-2025 23:49:54 PM Number of views for this article856

Microsoft has tracked a network of compromised Small Office / Home Office (SOHO) routers, predominantly TP-Link devices, as CovertNetwork-1658 (also called the Quad 7 (7777) botnet). This network has been used by Chinese threat actors for password spray attacks against Microsoft 365 accounts. The threat actor exploits vulnerabilities in the routers to gain remote code execution capability.

Sekoia.io monitored a TP-Link WR841N router (3.16.9 Build 150320 Rel.57500n), which is known to be vulnerable to a chained exploit attack used by the Quad 7 botnet. Sekoia observed a notable attack that chained an unauthenticated file disclosure and a command injection. This unauthenticated file disclosure allowed the threat actor to retrieve the pair of credentials stored in /tmp/dropbear/dropbearpwd and replay them in the HTTP Basic authentication of the management interface (NVD - CVE-2023-50224). Once authenticated, the attacker exploited a known command injection vulnerability in the Parental Control page to achieve the RCE (https://openwrt.org/toh/tp-link/tl-mr22u_v1, no documented CVE).

This exploit chain is only available when the end user has enabled the remote administration interface to the internet, which is not configured by default by TP-Link firmware. TP-Link recommends against exposing the remote administration interface to the internet as a matter of course.

Discovery Timeline:

10/19/2023

07/23/2024

09/09/2024

10/31/2024

Microsoft published a blog post reporting intrusion activity successfully targeting and stealing credentials from multiple Microsoft customers by a threat actor identified as associated with the Quad 7 botnet. Microsoft stated the network of compromised devices used by the threat actor was comprised mostly of TP-Link SOHO routers. Microsoft also noted the use of the compromised devices had declined steeply since the network’s activities were publicly reported on.

Related CVEs and Known Exploits

NVD - CVE-2023-50224 - According to Sekoia’s analysis, the threat actor chained two vulnerabilities.

  • The first vulnerability is an unauthenticated file disclosure allowing for the retrieval of credentials stored in /tmp/dropbear/dropbearpwd. These credentials were then replayed in the HTTP Basic authentication of the management interface. TP-Link has been tracking this vulnerability internally as TP-Link Vulnerability Disclosure (TPVD) 202321023 TL-WR841N. Patched firmware for the affected devices can be found here.
  • The second vulnerability is a known Parental Control command injection RCE exploit. In this vulnerability, tampering with the url_0 parameter in the Parental Control page is used to achieve the RCE. This vulnerability had not previously been reported to TP-Link and does not have a CVE. TP-Link is currently tracking this vulnerability internally as TPVD202411095 and we are processing a corresponding CVE submission. Patched firmware for the affected devices can be found here.

Related Firmware and Router Models

  • There are two router models and associated firmware versions relevant to the discovery timeline:
  • TL-WR841N/ND(MS) 9.0 Firmware version: 3.16.9 Build 150320 Rel.57500n
  • Archer C7(EU) 2.0, Firmware version 3.15.3 Build 180305 Rel.51282n
  • The firmware versions at issue are several revisions behind the latest firmware for these particular TP-Link SOHO Routers. The identified routers are also at End of Life (EOL) status, (see our EOL_List_Home.pdf and our TP-Link End-of-Life Policy). These been replaced by new families of products with superior capabilities and security models. . The replacement models are not affected by these vulnerabilities.
  • TP-Link is tracking unconfirmed reports of other vulnerable router models, and we will provide updates upon further investigation.

How TP-Link is Responding

  • TP-Link is performing the following:
  • Despite the affected router models used in the Quad 7 botnet being past their EOL/EOS date, TP-Link has developed and released firmware patching the vulnerabilities used by the Storm-0940/Quad7 threat actor (linked above). We have engaged with the community to raise awareness on the availability of these updates.
  • We are engaging with security researchers to obtain additional samples of affected binaries and deployed adversarial payloads in order to perform additional analysis and development of additional Indicators of Compromise (IoC).
  • TP-Link and its security partners are actively monitoring public intelligence data on the Quad 7 botnet and similar emerging threats, and the company commits to taking speedy and appropriate action to protect its customers and their devices.

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >