• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers raise red flag on p2pinfect malware with 600x activity

Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge

You are here: Home / General Cyber Security News / Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
September 21, 2023

The peer-to-peer (P2) worm acknowledged as P2PInfect has witnessed a surge in activity considering the fact that late August 2023, witnessing a 600x soar among September 12 and 19, 2023.

“This raise in P2PInfect website traffic has coincided with a developing amount of variants viewed in the wild, suggesting that the malware’s developers are functioning at an really high development cadence,” Cado Security researcher Matt Muir said in a report released Wednesday.

A bulk of the compromises have been noted in China, the U.S., Germany, the U.K., Singapore, Hong Kong, and Japan.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


P2PInfect first came to light in July 2023 for its capacity to breach poorly secured Redis cases. The risk actors behind the campaign have considering the fact that resorted to distinctive ways for initial obtain, such as the abuse of the database’s replication attribute to produce the malware.

Cybersecurity

Cado Security claimed it has observed an improve in initial access activities attributable to P2PInfect in which the Redis SLAVEOF command is issued by an actor-controlled node to a goal to help replication.

This is adopted by delivering a destructive Redis module to the concentrate on, which, in flip, runs a command to retrieve and launch the primary payload, soon after which an additional shell command is run to remove the Redis module from the disk as nicely as disable the replication.

P2PInfect Malware

1 of the new options of the more recent variants is the addition of a persistence mechanism that leverages a cron position to start the malware just about every 30 minutes.In addition, there now exists a secondary system that retrieves a copy of the malware binary from a peer and executes should really it be deleted or the most important course of action is terminated.

P2PInfect more overwrites current SSH authorized_keys information with an attacker-controlled SSH vital, successfully protecting against current end users from logging in in excess of SSH.

“The main payload also iterates by way of all end users on the process and attempts to change their user passwords to a string prefixed by Pa_ and followed by 7 alphanumeric figures (e.g. Pa_13HKlak),” Muir reported. This stage, nevertheless, necessitates that the malware has root access.

Forthcoming WEBINARLevel-Up SaaS Security: A Detailed Tutorial to ITDR and SSPM

Stay in advance with actionable insights on how ITDR identifies and mitigates threats. Find out about the indispensable function of SSPM in making sure your identification continues to be unbreachable.

Supercharge Your Competencies

Despite the increasing sophistication of the malware, P2PInfect’s actual targets are unclear. Cado Security reported it noticed the malware trying to fetch a crypto miner payload, but there is no evidence of cryptomining to date.

“It really is obvious that P2PInfect’s builders are fully commited to keeping and iterating on the operation of their malicious payloads, though at the same time scaling the botnet across continents and cloud suppliers at a fast level,” Muir stated.

“It is expected that those people driving the botnet are either ready to employ added performance in the miner payload, or are intending to promote accessibility to the botnet to other persons or groups.”

Found this article interesting? Stick to us on Twitter  and LinkedIn to read through additional unique content we article.


Some elements of this write-up are sourced from:
thehackernews.com

Previous Post: «the rise of the malicious app The Rise of the Malicious App
Next Post: Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents mysterious 'sandman' threat actor targets telecom providers across three continents»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.