article thumbnail

Godlua backdoor, the first malware that abuses the DNS over HTTPS (DoH)

Security Affairs

The peculiarity of this new piece of malware is the ability to communicate with C2 servers via DNS over HTTPS ( DoH ). The DoH protocol was a new standard proposed in October 2018 and it is currently supported by several publicly available DNS servers. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

DNS 80
article thumbnail

Massive increase in XorDDoS Linux malware in last six months

Malwarebytes

XorDDoS, a Linux Trojan known for its modularity and stealth, was first discovered in 2014 by the white hat research group, MalwareMustDie (MMD). The only simple (yet effective) tactic it uses is to brute force its way to gain root access to various Linux architectures. MMD believed the Linux Trojan originated in China.

Malware 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iranian Charming Kitten APT used a new BellaCiao malware in recent wave of attacks

Security Affairs

Iran-linked Charming Kitten group, (aka APT35 , Phosphorus , Newscaster , and Ajax Security Team) made the headlines in 2014 when experts at iSight issued a report describing the most elaborate net-based spying campaign organized by Iranian hackers using social media. Europe, the Middle East and India. Israel, Iraq, and Saudi Arabia.

Malware 95
article thumbnail

Trend Micro observed notable malware activity associated with the Momentum Botnet

Security Affairs

The Momentum bot targets various Linux platforms running upon multiple CPU architectures, including ARM, MIPS, Intel, and Motorola 68020. ” Momentum supports 36 different methods for DDoS attacks, including multiple reflection and amplifications attack methods that target MEMCACHE , LDAP , DNS and Valve Source Engine.

Malware 61
article thumbnail

Chalubo, a new IoT botnet emerges in the threat landscape

Security Affairs

The IoT malware ran only on systems with an x86 architecture. The most important novelty is represented by the discovery of a variety of bot versions, designed to target different architectures, including 32-bit and 64-bit ARM, x86, x86_64, MIPS, MIPSEL, and PowerPC. Pierluigi Paganini. Securi ty Affairs – Chalubo, IoT botnet).

IoT 79
article thumbnail

Key Takeaway from the Colonial Pipeline Attack

Cisco Security

Average fuel prices rose to their highest since 2014 and President Joe Biden declared a state of emergency to allow additional transport of fuel by road to alleviate shortages. Enforce security at the DNS layer. Cisco has designed a reference architecture that will help you phase your project. OT and IT networks have converged.

article thumbnail

Winnti Group was planning a devastating supply-chain attack against Asian manufacturer

Security Affairs

The PortReuse backdoor has a modular architecture, experts discovered that its components are separate processes that communicate through named pipes. ” ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.