FritzFrog botnet has been continuously targetting different systems for more than two years. The Cybersecurity researchers of Akamai security company have recently noted a new version that has a unique function through which it’s using the Tor proxy chain.
This botnet has been specifically targeting the following sectors along with an exposed SSH server:-
The cybersecurity analysts at Akamai have asserted that this malware has been written in Golang, and it was detected in August 2020; not only this but this malware has been considered as one of the advanced and sophisticated threats.
FritzFrog is considered a next-generation botnet, and it has been remarked because of the combination of properties that make it unique, so, that’s why we have mentioned the properties below:-
Apart from this, the global networks of sensors have detected nearly 24000 attacks, and not only that, even the operators of the botnet have claimed that they had implemented a total of 1500 attacks.
Most of the attacks took place in China, but it has also targeted the European Tv network, Russian healthcare, and many other universities in East Asia.
Here the threat actors had used filtering lists with the motive to skip low-powered devices like Raspberry Pu boards.
This new version has a unique function, and not only this, but it has been written in Golang, and it’s quite sophisticated malware. While this malware is being packed with UPX, and it has a total of four processes like:-
The malware usually gets executed under one particular process at one time. FritzFrog keeps getting updated on a daily basis, and sometimes it gets updated multiple times a day; therefore, it’s remarked as one of the most sophisticated and advanced botnets.
All the admins of data center servers, routers, and cloud instances are required to stay alert, as the FritzFrog targets any device that reveals an SSH server.
Therefore the security experts of Akamai has stated the following indicators of FritzFrog running on a system:-
Moreover, the cybersecurity analysts have also suggested some recommendations that we have mentioned below:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.
A new report has put the spotlight on potential security vulnerabilities within the popular open-source…
The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing by…
Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also come…
The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers to…
CYFIRMA's Research and Advisory team has identified a new strain of ransomware labeled "Nnice," following…
Microsoft has announced the general availability of 11 new Identity Secure Score recommendations in Microsoft…