Roboto ataques de botnets Webmin vulnerabilidad en servidores Linux

Qihoo 360 especialistas NETlab estudiaron el Roboto botnet, que surgió este verano. Botnet Roboto ataca la vulnerabilidad Webmin en servidores Linux.

yon August 2019, expertos en seguridad de la información informaron que una puerta trasera fue descubierto en Webmin, una solución de administración del sistema popular para sistemas Unix (como Linux, FreeBSD, o OpenBSD).

la vulnerabilidad CVE-2019-15107 allowed an attacker to execute arbitrary code on the target system with superuser rights.

“Since exploiting the vulnerability was not difficult, just a few days after the disclosure of the bug information, vulnerable versions of Webmin were attacked”, – escribir experts from Qihoo 360 Netlab.

It should be noted that according to official developers, Webmin has Mas que 1,000,000 instalaciones. Shodan discovers that more than 230,000 of them are accessible via the Internet, and according to BinaryEdge, Mas que 470,000 installations are vulnerable and accessible via the Internet. Por supuesto, such a “tidbit” had to be noticed by hackers.

“The Roboto botnet was one of the first to exploit the vulnerability in Webmin. Introduced in August 2019, Roboto lately has been mainly involved in development, with evolution of not only a size of the botnet, but also of the complexity of its code”, – write researchers from Qihoo 360 Netlab.

Although the main purpose of the botnet is definitely to conduct DDoS attacks, experts have not yet noticed Roboto doing it. Researchers believe that while botnet operators are mostly busy increasing size of the botnet, they have not yet reached the actual attacks.

leer también: El famoso Infostealer “Agente de Tesla” tiene un cuentagotas inusual

Según los analistas, the botnet is able to arrange DDoS using ICMP, HTTP, TCP and UDP. Adicionalmente, Roboto, installed on hacked Linux machines, can:

  • work as a reverse shell, which will allow an attacker to run shell commands on an infected host;
  • collect information about the system, processes and network of the infected server;
  • upload collected data to a remote server;
  • run system () comandos;
  • execute a file downloaded from a remote URL;
  • delete itself.
LEER  Los investigadores dicen sobre el crecimiento de la actividad de TFlower, otra ransomware que utiliza RDP

Another interesting feature of Roboto is the structure of its internal design. Bots here are organized in a P2P network and transmit commands that they receive from the management server to each other. Por lo tanto, not every bot individually communicates with the management server. The fact is that P2P communications are not so common in DDoS botnets (you can recall Hajime y Hide’N’Seek botnets as examples).

Como resultado, most Roboto bots are simple “zombies” engaged in sending commands, while others work to support a P2P network or scan for other vulnerable Webmin installations to increase the size of the botnet.

[Total:0    Promedio:0/5]

Acerca de Trojan Killer

Trojan Killer llevar portátil en su dispositivo de memoria. Asegúrese de que usted es capaz de ayudar a su PC resistir cualquier amenaza cibernética donde quiera que vaya.

también puedes ver

Cómo eliminar el virus Adware.Adposhel?

Adware.Adposhel es una detección genérica utilizada por Microsoft Security Essentials, Windows Defender y otros anti-virus …

¿Cómo eliminar Sload (StarsLord) virus de virus?

Sload (StarsLord) virus es una detección genérica utilizada por Microsoft Security Essentials, Windows Defender y …

Deja una respuesta