Check Point Research (CPR) encountered that ongoing attacks involve a new malware variant, called ‘FreakOut.’
The purpose behind these attacks is to create an IRC botnet. An IRC botnet is a collection of machines infected with malware that can be controlled remotely via an IRC channel to execute malicious commands.
It is used for malicious activities, such as launching DDoS attacks on other organizations’ networks, or for crypto-mining activity on infected machines, which can potentially shut down entire systems infected. The attacks are aimed at Linux devices.
The malware also comes with extensive capabilities consist of port scanning, information gathering, creation and sending of data packets, network sniffing, and the capability to launch DDoS and network flooding attacks.
The attack exploits the following CVE’s :
Patches are available for all products impacted in these CVEs.
IPS
Anti-Bot
For TerraMaster, the fixes will be implemented in version 4.2.07.
Liferay Portal users should upgrade to Liferay Portal 7.2 CE GA2 (7.2.1) or later. The maintainer no longer supports the Zend framework, and the lamins-http vendor released a relevant patch for this vulnerability should use 2.14.x bugfix release (patch).
Researchers found evidence from the attack campaign’s main C&C server that around 185 devices had been hacked.
The geographies that were most targeted were North America and Western Europe. Industry sectors´ most targeted were finance, government and healthcare organizations.
The threat actor behind the attack, named “Freak”, managed to infect many devices in a short period and incorporated them into a botnet, which in turn could be used for DDoS attacks and crypto-mining.
These attack campaigns emphasize the importance and significance of checking and protecting assets as an on-going basis. Therefore this ongoing campaign can spread quickly.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.
Also Read
NSA Revealed A Russian APT28 Hackers Made Previously Undisclosed Stealthy “Drovorub” Linux Malware
The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a…
Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application websites,…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…
The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…
Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…
Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…