A botnet attacks and acquires her access in other malware web shells (backdoors to web servers) for more than a year, security researchers at Positive Technologies revealed today.
The researchers linked the botnet to an old trojan named Neutrino (επίσης γνωστό καισαν Kasidet), οι χειριστές του οποίου φαίνεται να έχουν μετατοπίσει τη στόχευση από τα desktops χρηστών σε web servser, στους οποίους εγκαθιστούν ένα κακόβουλο λογισμικό κρυπτογράφησης.
Researchers at Positive Technologies report that this new phase of the Neutrino gang began early in 2018, when the team was able to develop a multifunctional botnet that detected random IP addresses on the Internet by searching for specific applications and servers that could be infected.
To compromise other servers, the Neutrino botnet uses various techniques, such as using exploits for old and new vulnerabilities, vulnerabilities in phpMyAdmin servers or that do not have a password, but also brute-force attacks on root accounts in phpMyAdmin, Tomcat and MS-SQL systems.
The researchers also report that the Neutrino does strange things, not seen in many others botnets. For example, this particular Neutrino looks for Ethereum nodes running with default passwords, connects to those systems, and steals files stored locally.
Neutrino as mentioned in the title also focuses on hacking web shells.
Web shells are backdoors used by hackers to perform operations on a compromised machine. They have a web-based interface from which hackers can log in and issue commands through their browser, or a custom programmed environment in which they send automated commands.
According to Positive Technologies researchers, Neutrino searches the web for 159 different types of PHP web shells and two JSPs (Java Server Pages).
The botnet creates a list of web shells and then launches brute-force attacks to guess login credentials and gain access.
As for Neutrino's success, Positive Technologies reports that the botnet was one of the three largest queries senders to their honeypots.
Based on the company's research, the botnet has proven to be quite successful in infecting Windows servers with phpStudy, an integrated learning environment popular among Chinese developers.
However, it also attacks phpMyAdmin servers.
“To protect servers from Neutrino infection, we recommend that administrators check the root password account of phpMyAdmin,” says Kirill Shipulin, security researcher at Positive Technologies.
“Make sure your services are up to date and install the latest updates. Remember that Neutrino is regularly updated with new exploits. ”
Technical details on the Neutrino modus operandi can be found at Publication by Positive Technologies.
_______________________
- Create a new virtual desktop in Windows 10
- How to Remove Spam From Your Wi-Fi
- See the Leonardo da Vinci notebook collection for free
- The Windows Notepad 10 application is now available in the Microsoft Store
.