Currently, a new botnet extends its reach with the help of code originating from various pieces of malware. The company is doing so by rapidly adding exploits for several vulnerabilities recently identified in the following things:-
As of March, when the latest analysis of the botnet emerged, a research team at Securonix discovered this botnet for the first time.
After more recent research by Securonix in March, Fortinet discovered newer samples of it in April. Currently, there are more than a dozen chip architectures with vulnerabilities, and more are in the works.
This botnet contains several modules for scanning for new targets and infecting them, which allow the malware to make distributed denial-of-service attacks.
In the early stages of the attack, the first targets included the routers from Seowon Intech, D-Link, and iRZ. Moreover, it has been identified that EnemyBot is linked to a malicious actor known as Keksec that is also known as:-
Several other botnets, including Mirai, Qbot, Zbot, Gafgyt, and LolFMe, are the origins of EnemyBot, which is capable of launching DDoS attacks. In terms of composition, it has four components, as evidenced by an analysis of the latest variant.
Here we have mentioned below all the four components of EnemyBot:-
EnemyBot includes exploits for 24 vulnerabilities in its latest version. In more than half of these cases, the vulnerability is critical, but there are a few that don’t even have a CVE number, which makes it more challenging to patch the vulnerability.
AT&T Alien Labs found exploits for a new variant of the Trojan that was analyzed. The exploits involved the following security vulnerabilities:-
A newer version of the malware appears to support a wider variety of commands, but RSHELL stands out as one of its features.
An infected system can be made vulnerable by using this command on an infected system. Threat actors gain access to compromised systems by bypassing firewalls with the help of this.
It was not a coincidence that the threat actors released the source code of EnemyBot, making it available to anyone wanting to use it against them.
Here below we have mentioned all the recommendations:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
A critical unauthenticated Remote Code Execution (RCE) vulnerability has been identified in D-Link's DSL-3788 routers,…
Authorities have delivered a major blow to the cybercrime world by dismantling two of the…
Microsoft has announced updates to its Microsoft 365 (M365) Bug Bounty Program, offering expanded services,…
Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware attack…
A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed…
Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer,"…