By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
digital news today : Latest News digital news today : Latest News
Notification Show More
Latest News
Italien killt Künstliche Intelligenz – wegen Datenschutzbedenken
tech
Test AMD Radeon RX 7900 XT : notre avis complet – Cartes graphiques
android
All The Battle Royales That Died After Fortnite & PUBG Blew Up
Gaming
Max Darmon, Sortie de l’EP La Grande Aventure
Marketing
Comment vérifier l’état de forme de vos collaborateurs
Marketing
Aa
  • Marketing
    • Crypto
    • news nft tech frensh
    • Technology
  • ahref
    • android
    • blogdumoderateur
    • creativetrends
    • Crypto
    • css tricks daily
  • Daily sécurité
    • dailydev
  • digitaltrends
    • Featured
    • Food
    • for blogger
    • google
    • gpldload
  • Technology
    • It-Connect
      • Laravel tricks
      • Marketing
      • news nft tech frensh
      • nft
      • thehackernews
      • web3
        • webrankinfo
Reading: New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
Share
digital news today : Latest News digital news today : Latest News
Aa
  • Marketing
  • ahref
  • Daily sécurité
  • digitaltrends
  • Technology
Search
  • Marketing
    • Crypto
    • news nft tech frensh
    • Technology
  • ahref
    • android
    • blogdumoderateur
    • creativetrends
    • Crypto
    • css tricks daily
  • Daily sécurité
    • dailydev
  • digitaltrends
    • Featured
    • Food
    • for blogger
    • google
    • gpldload
  • Technology
    • It-Connect
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
digital news today : Latest News > thehackernews > New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
thehackernews

New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks

Mike
Last updated: 2023/03/17 at 2:48
Mike
Share
SHARE


Mar 17, 2023Ravie LakshmananCybersecurity / Botnet

HinataBot

A new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers and use them to stage distributed denial-of-service (DDoS) attacks.

« The malware binaries appear to have been named by the malware author after a character from the popular anime series, Naruto, with file name structures such as ‘Hinata-<OS>-<Architecture>,' » Akamai said in a technical report.

Among the methods used to distribute the malware are the exploitation of exposed Hadoop YARN servers and security flaws in Realtek SDK devices (CVE-2014-8361), Huawei HG532 routers (CVE-2017-17215, CVSS score: 8.8).

Unpatched vulnerabilities and weak credentials have been a low-hanging fruit for attackers, representing an easy, well-documented entry point that does not require sophisticated social engineering tactics or other methods.

The threat actors behind HinataBot are said to have been active since at least December 2022, with the attacks first attempting to use a generic Go-based Mirai variant before switching to their own custom malware starting from January 11, 2023.

Since then, newer artifacts have been detected in Akamai’s HTTP and SSH honeypots as recently as this month, packing in more modular functionality and added security measures to resist analysis. This indicates that HinataBot is still in active development and evolving.

The malware, like other DDoS botnets of its kind, is capable of contacting a command-and-control (C2) server to listen for incoming instructions and initiate attacks against a target IP address for a specified duration.

While early versions of the botnet utilized protocols such as HTTP, UDP, TCP, and ICMP to carry out DDoS attacks, the latest iteration is limited to just HTTP and UDP. It’s not immediately known why the other two protocols were axed.

Akamai, which conducted 10-second attack tests using HTTP and UDP, revealed that the HTTP flood generated 3.4 MB of packet capture data and pushed 20,430 HTTP requests. The UDP flood, on the other hand, created 6,733 packets for a total of 421 MB of packet capture data.

In a hypothetical real-world attack with 10,000 bots, a UDP flood would peak at more than 3.3 terabit per second (Tbps), resulting in a potent volumetric attack. An HTTP flood would generate a traffic of roughly 27 gigabit per second (Gbps)

The development makes it the latest to join the ever-growing list of emerging Go-based threats such as GoBruteforcer and KmsdBot.

« Go has been leveraged by attackers to reap the benefits of its high performance, ease of multi-threading, its multiple architecture and operating system cross-compilation support, but also likely because it adds complexity when compiled, increasing the difficulty of reverse engineering the resulting binaries, » Akamai said.

WEBINAR

Discover the Hidden Dangers of Third-Party SaaS Apps

Are you aware of the risks associated with third-party app access to your company’s SaaS apps? Join our webinar to learn about the types of permissions being granted and how to minimize risk.

RESERVE YOUR SEAT

The findings also come as Microsoft revealed that TCP attacks emerged as the most frequent form of DDoS attack encountered in 2022, accounting for 63% of all attack traffic, followed by UDP floods and amplification attacks (22%), and packet anomaly attacks (15%).

Besides being used as distractions to conceal extortion and data theft, DDoS attacks are also expected to rise due to the arrival of new malware strains that are capable of targeting IoT devices and taking over accounts to gain unauthorized access to resources.

« With DDoS attacks becoming more frequent, sophisticated, and inexpensive to launch, it’s important for organizations of all sizes to be proactive, stay protected all year round, and develop a DDoS response strategy, » the tech giant’s Azure Network Security Team said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





source:thehackernews.com

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Mike mars 17, 2023
Share this Article
Facebook Twitter Copy Link Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article La mise à jour « March 2023 Core Update » montre ses premiers effets
Next Article The real Glastonbury poster controversy is the kerning
lapressecrypto.com
lapressecrypto.com
Follow US

© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Register Lost your password?