Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Salt Typhoon associated with China

June 24, 2025

DHS warns pro -Irkers who can target US networks after Iran’s nuclear strikes

June 23, 2025

Echo Chamber Jailbreak Tricks LLM as Openai and Google, To create harmful content

June 23, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A new variant of the Gafgyt botnet targets weak SSH passwords for GPU crypto mining
Global Security

A new variant of the Gafgyt botnet targets weak SSH passwords for GPU crypto mining

AdminBy AdminAugust 15, 2024No Comments3 Mins Read
Gafgyt Botnet Variant
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 15, 2024Ravi LakshmananNetwork Security / Cybercrime

A variant of the Gafgyt botnet

Cyber ​​security researchers have discovered a new variant Gaffit botnet targeting machines with weak SSH passwords for ultimate cryptocurrency mining on compromised instances using GPU processing power.

This suggests that “the IoT botnet is targeting more reliable servers running in native cloud environments,” said Aqua Security researcher Assaf Morag said in the analysis on Wednesday.

Gafgit (aka BASHLIT, Lizkebab, and Torlus), known as active in the wild since 2014, has a history exploiting weak or standard credentials to gain control over devices such as routers, cameras, and digital video recorders (DVRs). It is also capable of exploiting known security flaws in Dasan, Huawei, Realtek, SonicWall and Zyxel devices.

Cyber ​​security

Infected devices combine into a botnet capable of launching distributed denial-of-service (DDoS) attacks against targets of interest. There is evidence to suggest that Gafgyt and Necro are controlled by a threat group called Cupcakewhich is also tracked as Kek Security and FreakOut.

IoT botnets like Gafgyt constantly is developing to add new features, p options discovered in 2021 using the TOR network to mask malicious activities, as well as borrowing some modules from the Mirai source code leak. It should be noted that the source code of Gafgyt was leaked on the internet in early 2015, further fueling the emergence of new versions and adaptations.

A variant of the Gafgyt botnet

Recent attack chains involve brute-forcing SSH servers with weak passwords to deploy next-stage payloads to facilitate a cryptocurrency mining attack using “systemd-net”, but not before stopping competing malware already running on the compromised host.

It also runs a worm module, a Go-based SSH scanner called ld-musl-x86, which is responsible for scanning the Internet for poorly secured servers and spreading malware to other systems, effectively expanding the botnet’s scale. This includes SSH, Telnet and credentials related to game servers and cloud environments such as AWS, Azure and Hadoop.

Cyber ​​security

“The crypto miner used is XMRig, a Monero cryptocurrency miner,” Morag said. “However, in this case, the threat actor seeks to run a cryptominer using the –opencl and –cuda flags, which use the processing power of GPUs and Nvidia GPUs.”

“This, combined with the fact that the threat actor’s primary exposure is cryptomining rather than DDoS attacks, supports our contention that this option is different from previous ones. It aims to target cloud environments with strong CPU and GPU capabilities.”

Data collected by Shodan’s query indicates that there are more than 30 million public SSH servers, so it is critical that users take steps to protect their instances from brute force attacks and potential exploitation.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Salt Typhoon associated with China

June 24, 2025

DHS warns pro -Irkers who can target US networks after Iran’s nuclear strikes

June 23, 2025

Echo Chamber Jailbreak Tricks LLM as Openai and Google, To create harmful content

June 23, 2025

Xdigo malicious software operates Windows LNK deficiencies at Eastern Government attacks

June 23, 2025

How AI AI Automation Output can help SOC reduce burnout

June 23, 2025

Google adds multi -layered protection to ensure Genai from the Introduction Outcasts

June 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Salt Typhoon associated with China

June 24, 2025

DHS warns pro -Irkers who can target US networks after Iran’s nuclear strikes

June 23, 2025

Echo Chamber Jailbreak Tricks LLM as Openai and Google, To create harmful content

June 23, 2025

Xdigo malicious software operates Windows LNK deficiencies at Eastern Government attacks

June 23, 2025

How AI AI Automation Output can help SOC reduce burnout

June 23, 2025

Google adds multi -layered protection to ensure Genai from the Introduction Outcasts

June 23, 2025

A spider scattered for cyberattacks on M&S and a co -op, which has led to $ 592 million losses.

June 21, 2025

Qilin Ransomware adds the “Call Lawyer” function to pressure victims for big ransom

June 20, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Salt Typhoon associated with China

June 24, 2025

DHS warns pro -Irkers who can target US networks after Iran’s nuclear strikes

June 23, 2025

Echo Chamber Jailbreak Tricks LLM as Openai and Google, To create harmful content

June 23, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.