Wednesday, December 18, 2024
HomeBotnetInfamous Necro Python bot Added new Tools to Improve Its Chances of...

Infamous Necro Python bot Added new Tools to Improve Its Chances of Infecting Vulnerable Systems

Published on

SIEM as a Service

Nowadays, cyberattacks are increasing rapidly, and as per the report, most cybercriminals are using the automatic bot method to perform all kinds of malware infections, not only this, through the method the threat actors also take control of remote computers and perform some critical cyberattacks.  

Recently, the Necro python has made numerous changes, as they have added some new tools in an attempt to enhance its all possibilities of infecting vulnerable systems as well as evading detection.

Necro Python

Necro Python, is a self-replicating, polymorphic bot that has been in progress since 2015, and it is also known by the name “FreakOut” or “Necro.”

- Advertisement - SIEM as a Service

The main motive of Necro Python is that it generally finds the remote computer systems running Windows or Linux, and then later it easily exploits the security vulnerabilities that are present in the operating system or an installed application.

In early 2021 the development progress has been announced regarding the botnets. However, as we said above, Necro Python has started its development in 2015, and this year it has made some significant changes to enhance all its power.

Necro Python was being developed by all specialized developers, and they have made several changes in the bot, with the motive of increasing the power flexibility of the bot.

However, the developer has included nearly 10 different web applications, as well as the SMB protocol that are being used as a weapon in a recent campaign of Bot. The developers have also included exploits for vulnerability in various software like SCO OpenServer, the Vest Control Panel, and the VMWare vSphere.

This new botnet has the ability to connect to a C2 server simply by using the IRC and later it accepts all the commands that are associated with:- 

  • Configuration changes
  • Exploitation
  • Launching distributed denial-of-service attacks
  • RAT functionality

According to the reports, all these associated commands were used to download and implement the additional code or sniff network traffic to eliminate the collected data.

On May 18 the new version of the botnet got released and it also includes exploits for EternalBlue as CVE-2017-0144 and EternalRomance as CVE-2017-0147. 

However, the cybersecurity researchers affirmed that the new bot injects the code into an HTML or PHP file on an affected system from an attacker-managed server.

The main motive of injecting the code is to download and implement a JavaScript-based miner. Not only this but the researchers also claimed that all these new techniques and methods will surely help Necro to evade the infected system based on security protection.

Moreover, the cybersecurity experts at Talos asserted that they will keep updating the Necro with new and modern tools for detection that will include Response products and Extended Detection.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files

Recent research has linked a series of cyberattacks to The Mask group, as one...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files

Recent research has linked a series of cyberattacks to The Mask group, as one...

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary...