A new botnet campaign known as Ballista has emerged, exploiting an unpatched vulnerability in TP-Link Archer routers. This campaign has reportedly infected over 6,000 devices globally, raising significant concerns about network security and the potential for widespread attacks.

Key Takeaways
Vulnerability: The botnet exploits a remote code execution vulnerability (CVE-2023-1389) in TP-Link Archer AX-21 routers.
Infection Rate: Over 6,000 devices have been compromised, primarily in Brazil, Poland, the UK, Bulgaria, and Turkey.
Attack Mechanism: The malware establishes a command-and-control channel to execute commands and spread further.
Targeted Sectors: The botnet primarily targets manufacturing, healthcare, and technology sectors in various countries.
Overview Of the Ballista Botnet
The Ballista botnet has been identified as a significant threat, leveraging a high-severity security flaw in TP-Link routers. The vulnerability allows attackers to execute arbitrary code remotely, which can lead to severe consequences, including unauthorized access and control over infected devices.
The earliest signs of exploitation were noted in April 2023, with attackers initially deploying Mirai malware. Since then, the vulnerability has been exploited to distribute various malware types, including Condi and AndroxGh0st.
Technical Details of The Exploit
The Ballista campaign was first detected on January 10, 2025, with the latest activity recorded on February 17. The attack process involves:
Malware Dropper: A shell script named dropbpb.sh is used to fetch and execute the main malware binary on targeted systems.
Command-and-Control Channel: Once executed, the malware creates an encrypted C2 channel on port 82, allowing attackers to control the device remotely.
Command Execution: The malware can execute various commands, including:Flooder: Initiates a flood attack.Exploiter: Exploits the CVE-2023-1389 vulnerability.Shell: Executes Linux shell commands.Killall: Terminates the malware service.
Geographic Spread and Targeted Industries
The infections are not limited to a specific region but are concentrated in several countries, including:
Brazil
Poland
United Kingdom
Bulgaria
Turkey
The botnet has been found to target critical sectors such as:
Manufacturing
Healthcare
Technology
These sectors are particularly vulnerable due to their reliance on networked devices and systems.
The emergence of the Ballista botnet highlights the critical need for users and organizations to ensure their devices are updated and patched against known vulnerabilities. As the malware continues to evolve, it is essential to remain vigilant and implement robust security measures to protect against such threats. Regularly updating firmware and employing network security best practices can significantly reduce the risk of infection and exploitation.
As cybercriminals continue to adapt their strategies, awareness and education remain crucial in combating these threats. Cybersecurity is critical. BetterWorld Technology offers cutting-edge solutions to combat evolving threats while driving innovation. Protect your business with confidence—contact us today for a consultation!
Sources
Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices, The Hacker News.