Sunday, April 19, 2026
HomeCyber SecurityAbcbot — A New Evolving Wormable Botnet Malware Focusing on Linux

Abcbot — A New Evolving Wormable Botnet Malware Focusing on Linux

[ad_1]

Abcbot — A New Evolving Wormable Botnet Malware Focusing on Linux

Researchers from Qihoo 360’s Netlab safety workforce have launched particulars of a brand new evolving botnet referred to as “Abcbot” that has been noticed within the wild with worm-like propagation options to contaminate Linux programs and launch distributed denial-of-service (DDoS) assaults towards targets.

Whereas the earliest model of the botnet dates again to July 2021, new variants noticed as lately as October 30 have been outfitted with further updates to strike Linux net servers with weak passwords and are vulnerable to N-day vulnerabilities, together with a customized implementation of DDoS performance, indicating that the malware is underneath steady growth.

Netlab’s findings additionally construct on a report from Development Micro early final month, which publicized assaults concentrating on Huawei Cloud with cryptocurrency-mining and cryptojacking malware. The intrusions had been additionally notable for the truth that the malicious shell scripts particularly disabled a course of designed to watch and scan the servers for safety points in addition to reset customers’ passwords to the Elastic cloud service.

Automatic GitHub Backups

Now in accordance with the Chinese language web safety firm, these shell scripts are getting used to unfold Abcbot. A complete of six variations of the botnet have been noticed to this point.

As soon as put in on a compromised host, the malware triggers the execution of a collection of steps that leads to the contaminated gadget being repurposed as an online server, along with reporting the system data to a command-and-control (C2) server, spreading the malware to new gadgets by scanning for open ports, and self-updating itself as and when new options are made out there by its operators.

Botnet Malware

“Fascinating factor is that the pattern [updated] on October 21 makes use of the open-source ATK Rootkit to implement the DDoS operate,” a mechanism which the researchers stated “requires Abcbot to obtain the supply code, compile, and cargo the rootkit module earlier than performing [a] DDoS assault.”

“This course of requires too many steps, and any step that’s defective will end result within the failure of the DDoS operate,” the researchers famous, main the adversary to interchange the off-the-shelf part with a customized assault module in a subsequent model launched on October 30 that utterly abandons the ATK rootkit.

Prevent Data Breaches

The findings come a little bit over per week after the Netlab safety workforce disclosed particulars of a “Pink” botnet that is believed to have contaminated over 1.6 million gadgets primarily positioned in China with the aim of launching DDoS assaults and inserting ads into HTTP web sites visited by unsuspecting customers. In a associated growth, AT&T Alien Labs took the wraps off a brand new Golang malware dubbed “BotenaGo” that has been found utilizing over thirty exploits to doubtlessly assault hundreds of thousands of routers and IoT gadgets.

“The replace course of in these six months just isn’t a lot a steady improve of options as a trade-off between completely different applied sciences,” the researchers concluded. “Abcbot is slowly shifting from infancy to maturity. We don’t take into account this stage to be the ultimate type, there are clearly many areas of enchancment or options to be developed at this stage.”



[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments