Kaiten: returns stronger than ever

ESET researchers have identified a new and improved version of ESET Kaiten, a malware controlled via Relay Chat (IRC) και το οποίο συνήθως ται  για επιθέσεις άρνησης εξυπηρέτησης (distributed denial-of-service, DDoS). Kaiten

The new version of malware has been called "KTN-Remastered" or "KTN-RM," while ESET researchers have already identified three versions of malware Linux / Remaiten. Based on the artifacts found in the code, the main feature of malware is the improved spread mechanism.

Based mainly on his telnet scan Linux / Gafgyt, το KTN-RM (Kaiten) βελτιώνει το μηχανισμό εξάπλωσης χρησιμοποιώντας εκτελέσιμα δυαδικά downloaders για ενσωματωμένες πλατφόρμες, όπως και άλλες συνδεδεμένες συσκευές, ενώ στοχεύουν κυρίως περιπτώσεις με αδύναμο διαπιστευτήρια σύνδεσης.

 "In addition, his work downloader is to ask the Command & Control server for the Linux / Remaiten binary bot for its current architecture. When executed, it creates another bot that can be maliciously used by its creators. We have encountered this technique before using it Linux / Moose for spreading, "notes Michal Malík, Malware Researcher of ESET.

In a strange twist, this strain of malware also has one for those who might try to neutralize it.

«In the welcome message, 2.0 appears to stand out malwaremustdie.org which has published extensive details about it Gafgyt, the Tsunami and other members of this family Malware"Adds Malík.

More information about Bot Linux / Remaiten is available at technical article by Michal Malik on ESET's official blog for security, WeLiveSecurity.com.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).