• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers

You are here: Home / Cyber Security News / New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers

Inadequately managed Linux SSH servers are becoming qualified as section of a new marketing campaign that deploys distinctive variants of a malware referred to as ShellBot.

“ShellBot, also identified as PerlBot, is a DDoS Bot malware produced in Perl and characteristically employs IRC protocol to talk with the C&C server,” AhnLab Security Unexpected emergency reaction Centre (ASEC) stated in a report.

ShellBot is set up on servers that have weak qualifications, but only after danger actors make use of scanner malware to determine devices that have SSH port 22 open.

A checklist of identified SSH qualifications is used to initiate a dictionary attack to breach the server and deploy the payload, after which it takes advantage of the Internet Relay Chat (IRC) protocol to talk with a distant server.

This encompasses the capability to obtain commands that lets ShellBot to have out DDoS attacks and exfiltrate harvested facts.

ASEC reported it discovered 3 distinctive ShellBot versions โ€“ LiGhT’s Modded perlbot v2, DDoS PBot v2., and PowerBots (C) GohacK โ€“ the to start with two of which give a range of DDoS attack commands working with HTTP, TCP, and UDP protocols.

PowerBots, on the other hand, will come with additional backdoor-like abilities to grant reverse shell access and upload arbitrary documents from the compromised host.

The findings appear nearly a few months immediately after ShellBot was employed in attacks aimed at Linux servers that also distributed cryptocurrency miners by using a shell script compiler.

WEBINARDiscover the Hidden Risks of 3rd-Bash SaaS Apps

Are you conscious of the dangers affiliated with third-social gathering app obtain to your company’s SaaS apps? Sign up for our webinar to discover about the forms of permissions remaining granted and how to decrease risk.

RESERVE YOUR SEAT

“If ShellBot is set up, Linux servers can be utilized as DDoS Bots for DDoS attacks from precise targets immediately after receiving a command from the threat actor,” ASEC explained. “Also, the risk actor could use different other backdoor functions to set up additional malware or start diverse varieties of attacks from the compromised server.”

The development also comes as Microsoft exposed a gradual raise in the selection of DDoS assaults targeting healthcare organizations hosted in Azure, surging from 10-20 attacks in November 2022 to 40-60 assaults day by day in February 2023.

Identified this article appealing? Abide by us on Twitter ๏‚™ and LinkedIn to examine a lot more special material we submit.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « The Best Defense Against Cyber Threats for Lean Security Teams
Next Post: New ‘Bad Magic’ Cyber Threat Disrupt Ukraine’s Key Sectors Amid War »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 ยท AllTech.News, All Rights Reserved.