Friday, December 6, 2024
HomeBotnetA New Golang-based (P2P) Botnet "Panchan" Actively Attacking Linux Servers

A New Golang-based (P2P) Botnet “Panchan” Actively Attacking Linux Servers

Published on

SIEM as a Service

A new P2P botnet targeting Linux servers has been tracked recently by Akamai security researchers. The botnet network has been identified as ‘Panchan,’ which is active since March 2022 and is based on the Golang programming language.

A wormable behavior is implemented by Panchan through an SSH dictionary attack, which harvests SSH keys for lateral movement and uses them as keys to initiate SSH connections.

By building in concurrency via its built-in capabilities, the bot maximizes its spreading abilities and executes malware modules simultaneously.

- Advertisement - SIEM as a Service

This botnet primarily consists of activities that are related to cryptocurrency mining. Using the computer’s resources to mine cryptocurrencies is what the malicious code intends to do with the code.

During the course of Panchan’s processing, two miners have been known to be deployed and executed on the host, namely XMRig and nbhash. A unique feature of the network is the fact that the miners do not extract themselves to disk to maintain the network’s security.

Panchan’s features

Here below we have listed all the key features of Panchan:-

  • Infection vector – SSH worm
  • Peer-to-peer communication
  • Godmode
  • Fileless miner
  • Anti-kill
  • Anti-monitor
  • Persistence

Activity of Panchan

Earlier this year, the cybersecurity and cloud service company, Akamai on March 19, 2022, first spotted Panchan’s activity.

Based on the language used in the administrative panel that is embedded in the binary, which allows the user to edit the mining configuration, the Malware researchers attributed it to a likely Japanese threat actor at the time.

Researchers discovered that the malware implements a system called “godmode”, which is an admin panel that enables the threat actor to take control of the system remotely.

Operators are able to make modifications to the mining configuration using this panel, and the edits are then sent to all nodes of the botnet. To prevent unwanted tampering with the content of godmode, threat actors were monitored using private keys to access the content.

In addition to this private key, the bot contains a public key which is used to authenticate the connection to the private key. Here the threat actor probably originates from Japan, since the admin panel is written in Japanese.

During the research process, the security analysts discovered 209 peers, of which 40 are active at the moment. While the maximum number of compromised systems are discovered in the following regions:-

  • Asia (64)
  • Europe (52)
  • North America (45)
  • South America (11)
  • Africa (1)
  • Oceania (1)

Mitigation

Users who want to keep their networks protected proactively can opt for the mitigations listed below. As these mitigations are recommended by security analysts:-

  • Make sure your passwords are complex and secure.
  • Where possible, set up multi-factor authentication.
  • Make sure your network is segmented as much as possible.
  • Pay attention to how your VMs are using their resources.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

One Identity Named Winner of the Coveted Top InfoSec Innovator Awards for 2024

One Identity named Hot Company: Privileged Access Management (PAM) in 12th Cyber Defense Magazine’s...

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Hackers Exploit Docker Remote API Servers To Inject Gafgyt Malware

Attackers are exploiting publicly exposed Docker Remote API servers to deploy Gafgyt malware by...

Water Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting Vulnerabilities

Water Barghest, a sophisticated botnet, exploits vulnerabilities in IoT devices to enlist them in...

Russia-Linked Hackers Attacking Governmental And Political Organizations

Two pro-Russian threat actors launched a distributed denial-of-service (DDoS) attack campaign against Japanese organizations...