Hackers are using P2P malware botnet malware to target IoT devices
A new botnet malware has been unveiled by the security researchers which is targeting IoT devices.
The botnet is targeting internet-connected smart devices and are using these devices to perform DDoS attacks and cryptocurrency coin mining. The Botnet is written in Go language and armed with a proprietary peer-to-peer (P2P) protocol, spreads via a brute-force attack of the Telnet and can execute arbitrary shell commands.
Researchers have reported that the botnet is still in its early stages of development but already has 3 separate modules. The botnet has a propagation module, a local HTTP service module, and a P2P module.
A malicious Shell script named "wpqnbw.txt," was found to be the origin of the attack. The shell script uses this Shell script to download various malicious modules from the hacker-controlled websites. The downloaded module is based on the different CPU architectures and functioning.
The botnet further starts a HTTP server that displays the Universal Declaration of Human Rights in eight different languages and subsequently initializing a P2P module that keeps track of the infected peers and allows the attacker to run arbitrary shell commands.
The botnet has the feature of deleting all the data of compromised device and other commands make it possible to restart a bot, update the list of peers, and exit the current running bot. The researchers have claimed that the botnet is using brute force attack to hack the telnet ports and amplify itself.
NPAV recommends users to always use secure internet connections and never connect to any untrusted or insecure network. Install NPAV on your devices to keep them protected from all kinds of botnet and other cyber attacks. NPAV ensures device and network security by guarding against cyber attacks.
Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)