New worm attacks Linux devices

A new worm that is based on malicious Mirai, attacks Linux devices and installs application of cryptocurrencies.

worm, linux, bot, mirai

The new and previously unknown self-replicating malware attacks Linux devices around the world via a network called Noabot, and installs cryptomining malware while taking unusual steps to hide its inner workings.

The worm is a customized version of Mirai, a malware that infects Linux-based servers, routers, webcams and other so-called IoT devices.

Mirai came to light in 2016 when it was used in a denial-of-service attack that paralyzed key parts of the internet that year.

The worm's creators released the source code after the attack, so several criminal groups from around the world incorporated Mirai into their own attack campaigns.

The new worm has just settled into a Linux, uses it as a platform to infect other vulnerable devices (that's why it's called a worm), which means it's self-replicating.

Researchers from the company Akamai revealed that NoaBot has been targeting Linux devices since at least last January. Instead of targeting weak telnet passwords, NoaBot targets weak passwords connecting SSH connections.

The new botnet installs cryptocurrency mining software, which allows attackers to create digital currencies using computing resources, electricity and victims' bandwidth.

cryptominer is a modified version of XMRig, another piece of open source malware.

To date, the originate from 849 distinct IP addresses, almost all of which likely host an already infected device.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
worm, linux, bot, mirai

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).