• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new "b1txor20" linux botnet uses dns tunnel and exploits log4j

New “B1txor20” Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw

You are here: Home / General Cyber Security News / New “B1txor20” Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw
March 16, 2022

A beforehand undocumented backdoor has been noticed concentrating on Linux programs with the purpose of corralling the machines into a botnet and acting as a conduit for downloading and putting in rootkits.

Qihoo 360’s Netlab security workforce named it B1txor20 “based on its propagation applying the file title ‘b1t,’ the XOR encryption algorithm, and the RC4 algorithm important length of 20 bytes.”

Automatic GitHub Backups

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Initial noticed propagating by means of the Log4j vulnerability on February 9, 2022, the malware leverages a strategy known as DNS tunneling to construct interaction channels with command-and-control (C2) servers by encoding knowledge in DNS queries and responses.

Linux Botnet

B1txor20, when also buggy in some strategies, now supports the ability to get hold of a shell, execute arbitrary commands, set up a rootkit, open a SOCKS5 proxy, and capabilities to add delicate details back to the C2 server.

After a equipment is properly compromised, the malware utilizes the DNS tunnel to retrieve and execute commands sent by the server.

Prevent Data Breaches

“Bot sends the stolen sensitive details, command execution success, and any other details that wants to be delivered, soon after hiding it employing distinct encoding tactics, to C2 as a DNS ask for,” the scientists elaborated.

“Soon after receiving the ask for, C2 sends the payload to the Bot side as a response to the DNS ask for. In this way, Bot and C2 accomplish conversation with the help of DNS protocol.”

A whole of 15 instructions are applied, chief amid them currently being uploading technique information, executing arbitrary process instructions, looking at and composing information, starting off and stopping proxy solutions, and generating reverse shells.

Uncovered this posting intriguing? Stick to THN on Fb, Twitter  and LinkedIn to read through much more distinctive content material we write-up.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «new infinite loop bug in openssl could let attackers crash New Infinite Loop Bug in OpenSSL Could Let Attackers Crash Remote Servers
Next Post: Another Destructive Wiper Targets Organizations in Ukraine another destructive wiper targets organizations in ukraine»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.