Botnet Echobot spreads across a wide range, specifically targeting Oracle and VMware applications
A relatively new botnet named Echobot has contributed to 26 dangerous exploits, while using exploits as a tool to spread quickly. According to statistics, most of the exploits codes that Echobot contributes to are for IoT devices that have not been updated with security patches. However, many enterprise applications Oracle WebLogic and VMware SD-Wan are among the targets - a point to be particularly careful about.
Echobot is based on Mirai malware, which is like hundreds of other botnets that appear after the source of a malware is made public. It was first revealed (https://unit42.paloaltonetworks.com/new-mirai-variant-adds-8-new-Exloits-target-additable-iot-devices/) earlier this month by researchers Secure security at Palo Alto Networks. Experts have found this botnet at the time of 'only' part of 18 exploits worldwide.
- Telegram has just suffered heavy DDoS, but no significant damage was recorded
Echobot Botnet is spreading rapidly around the world
IoT devices become the main target
Popular security researcher Larry Cashdollar of Akamai's network security intelligence response group (SIRT) observed a new version of Echobot botnet, adding a new series of exploits to help it expand. spread.
"I have counted a total of 26 independent exploits that are being used to spread this botnet. Most of these are command execution vulnerabilities that are well known in other networked devices. each other, "said Larry Cashdollar.
- Shade ransomware, the nightmare of 5 years ago is showing signs of returning
Target of Echobot variant
The goals of the latest Echobot variant include networked storage devices (NAS), routers (routers), network video recorders (NVRs), IP cameras, IP phones and presentation systems. wireless presentation systems.
The old holes that have been around for decades have been exploited again
Larry Cashdollar and colleagues are having difficulty identifying the vulnerabilities used by this botnet, because some of them have been publicly discovered, but there are no designated tracking numbers. specific for each case.
Cashdollar's team overcame the problem by contacting MITER and thanks to the organization reallocating the vector identification number, he found the CVE symbols missing.
This effort plays an extremely useful role not only for the research of Cashdollar and his colleagues, but also for other experts when finding vulnerabilities exploited in nature because the CVE number is a system. Standard classification is used by the infosec community.
Cashdollar has also compiled a list with the errors used by the new Echobot variant as follows:
list with vulnerabilities used by new Echobot variants
- Microsoft warned about malicious spam campaigns using vulnerabilities in Office and Wordpad
One important aspect this researcher warns is that the author (s) of the botnet expanded the target list beyond the IoT device range, and added exploits targeting Oracle WebLogic. VMware SD-WAN server and network software, which is used to provide cloud services, private data storage centers, and SaaS-based enterprise applications - play a critical role with many organizations and businesses.
In addition, the team also noted the phenomenon of old security vulnerabilities that have been around for decades that have been exploited by this botnet, suggesting that malware authors are completely unaware. mind the age of the vulnerability, provided they still have excellent performance for devices that have not been patched.
This shows that many vulnerable systems are still being used, and most likely they become good prey for Echobot background updates not timely security patches.
- GoldBrute botnet campaign is trying to hack 1.5 million RDP servers worldwide
Research by Larry Cashdollar and colleagues revealed more information about Echobot only using the same attack code originating from Mirai, and the most obvious difference is in the exploits that are helping it. spread quickly around the world.
Larry Cashdollar noticed that the command and control servers (C2 Server) were set for domains akumaiotsolutions [.] Pw and akuma Pw, although they were completely non-resolving to IP addresses.
You should read it
- What do you know about the first 'cyber attack' in the world?
- The US warned about DealtaCharlie - DDoS botnet malware from Korea
- Facebook is a new trend in cyber attacks
- Sayings worth the tech godfather Larry Ellison
- How the botnet works
- Microsoft dismantled the ZLoader botnet, naming key members as a deterrent
- GoldBrute botnet campaign is trying to hack 1.5 million RDP servers worldwide
- HelloKitty Ransomware Using Linux Variant Attacks VMware ESXi Server
May be interested
- How to Study Oraclemastering the ins-and-outs of the oracle database can be a highly-rewarding pursuit. however, it requires a great deal of commitment to get to the highest levels of the profession, and there are no shortcuts.http://www.dba-oracle.com/t_o...
- Compare VMware Workstation Pro and VMware Workstation Playervmware workstation pro and vmware workstation player are two industry standard desktop virtualization software to run multiple operating systems such as virtual machines on windows or linux-based devices.
- Microsoft has just taken down a huge botnet networkthis botnet, called necurs, is behind the notorious 'banking' trojan, gameover zeus, along with dozens of other types of malware.
- Learn About Accent Oracle: AI That Can Predict Accents With Extreme Accuracyeven if you think your accent is too good to be detected, accent oracle can prove you wrong.
- What is WDR technology?wdr stands for wide dynamic range - anti-backlight technology used on cameras or cameras to be able to record and take pictures in all lighting conditions.
- Microsoft dismantled the ZLoader botnet, naming key members as a deterrentmicrosoft has just announced that it has successfully dismantled the zloader botnet. it was this criminal botnet that exploited the xlm macro in excel to attack potential victims.
- How to fix Not enough physical memory on VMwarevmware is a software for creating virtual machines on a computer, enabling you to run multiple operating systems in parallel. however, when a not enough physical memory error occurs on vmware, users will not be able to install the software.
- This day 30 years ago, the World Wide Web was born!world wide web abbreviated web or www is one of the first internet applications was born on march 12, 1989.
- VMware Workstation Player - Download VMware Workstation Playervmware workstation player is the ideal utility for running a single virtual machine on a pc running windows or linux. organizations use workstation player to provide company-managed desktops, while students and educators use the tool for learning and training.
- VMware Workstation Pro - Download VMware Workstation Pro herevmware workstation pro is a virtualization tool that allows users to run multiple operating systems on windows pcs. the platform creates a safe and isolated environment for users to create and test applications, test patches, and try out different operating systems before they go live.