Saturday, January 18, 2025
HomeCyber AttackFritzFrog Botnet Targeting SSH server, Data Center Servers, and Routers

FritzFrog Botnet Targeting SSH server, Data Center Servers, and Routers

Published on

SIEM as a Service

Follow Us on Google News

FritzFrog botnet has been continuously targetting different systems for more than two years. The Cybersecurity researchers of Akamai security company have recently noted a new version that has a unique function through which it’s using the Tor proxy chain.

This botnet has been specifically targeting the following sectors along with an exposed SSH server:-

  • Education systems
  • Government systems
  • Healthcare systems

The cybersecurity analysts at Akamai have asserted that this malware has been written in Golang, and it was detected in August 2020; not only this but this malware has been considered as one of the advanced and sophisticated threats.

FritzFrog: A next-gen botnet

FritzFrog is considered a next-generation botnet, and it has been remarked because of the combination of properties that make it unique, so, that’s why we have mentioned the properties below:- 

  • Constantly updated: All the databases of targets and breached machines are traded seamlessly.
  • Aggressive: Brute force is established on an extensive dictionary; thus, by comparison, DDG, another one has been discovered that is P2P botnet, and it uses o the only username “root.”
  • Efficient: All the targets are evenly disseminated among nodes.
  • Proprietary: The P2P protocol is totally proprietary, and it relies on no known P2P protocols such as μTP.

Second wave with new abilities

Apart from this, the global networks of sensors have detected nearly 24000 attacks, and not only that, even the operators of the botnet have claimed that they had implemented a total of 1500 attacks.

Most of the attacks took place in China, but it has also targeted the European Tv network, Russian healthcare, and many other universities in East Asia.

Here the threat actors had used filtering lists with the motive to skip low-powered devices like Raspberry Pu boards.

Capabilities

This new version has a unique function, and not only this, but it has been written in Golang, and it’s quite sophisticated malware. While this malware is being packed with UPX, and it has a total of four processes like:-

  1. ifconfig
  2. nginx
  3. apache2
  4. php-fpm

The malware usually gets executed under one particular process at one time. FritzFrog keeps getting updated on a daily basis, and sometimes it gets updated multiple times a day; therefore, it’s remarked as one of the most sophisticated and advanced botnets.

Recommendation

All the admins of data center servers, routers, and cloud instances are required to stay alert, as the FritzFrog targets any device that reveals an SSH server.

Therefore the security experts of Akamai has stated the following indicators of FritzFrog running on a system:-

  • Running processes named nginx, ifconfig, php-fpm, apache2, or libexec, whose executable file no longer exists on the file system.
  • Listening on port 1234.
  • TCP traffic over port 5555 implies network traffic to the Monero pool.

Moreover, the cybersecurity analysts have also suggested some recommendations that we have mentioned below:-

  • Always allow the system login auditing with a warning.
  • Always monitor the authorized_hosts file on Linux.
  • Always configure explicit allow list of SSH login.
  • Always allow root SSH access.
  • Always allow the cloud-based DNS protection with threats and extraneous business apps like coin mining set to block.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....