• Login
Fintedex — Business, Fincance & Investment News
  • Contact
  • Submit a News Releases
No Result
View All Result
  • Contact
  • Submit a News Releases
No Result
View All Result
Fintedex — Business, Fincance & Investment News
No Result
View All Result
Home Technology

Linux botnet abuses log4j to attack Arm, x86-based devices

Timothy Wilson by Timothy Wilson
17.03.2022
in Technology
0
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

We’re months into the disclosure of the log4j vulnerability and new attacks are still popping up. Cybersecurity researchers from Qihoo 360, a Chinese cybersecurity company, have just discovered a new Linux botnet, taking advantage of the flaw to distribute rootkits and steal sensitive data. 

They named the botnet B1txor20, and claim it uses the log4j vulnerability to target Linux Arm and 64-bit x86 systems. 

“In addition to traditional backdoor functions, B1txor20 also has functions such as opening a Socket5 proxy and remotely downloading and installing a rootkit,” the researchers said.

TechRadar needs you!

We’re looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn’t take more than 60 seconds of your time, and entrants from the UK and US will have the chance to enter a draw for a £100 Amazon gift card (or equivalent in USD). Thank you for taking part.

>> Click here to start the survey in a new window

Buggy botnet

Besides installing rootkits, the botnet seeks to read and write files, run and terminate proxy services, as well as run reverse shells. It can also exfiltrate data from afflicted endpoints, and run commands, remotely, which could result in the distribution of dangerous malware. 

This is far from a perfect botnet, though, as researchers have also found bugs and non-functional features, as well. One of the bugs deletes the socket file after binding the domain socket making the socket unconnectable, and the whole function useless.

The researchers expect the threat actor will put in additional hours to iron out the kinks, making the botnet even more dangerous than it already is. 

“We presume that the author of B1txor20 will continue to improve and open different features according to different scenarios, so maybe we will meet B1txor20’s siblings in the future,” the group said.

Read more

> Log4j could be the most serious security threat ever seen, CISA head warns

> Log4j attacks are still a major threat, warns Microsoft

> FTC says it will come after firms who haven’t patched Log4j flaws

The vulnerability, discovered in early December last year in Apache’s logging tool, log4j, has been dubbed one of the most dangerous ones – ever. Log4j is being widely used, and given that the flaw allowed third-party actors remote, full access, to the target device, its destructive potential is limitless. 

Once discovered, Apache rushed to develop a patch, making mistakes along the way. It took multiple attempts, and multiple patches, for the log4j vulnerability to finally be plugged. Administrators everywhere are urged to keep their systems up to date. 

  • Protect yourself with the best antivirus software right now

Via: The Register


Previous Post

Google IO 2022 dates, registration, and what to expect from Google’s online show

Next Post

Android tablets are getting a feature that’ll make them fantastic iPad rivals

Related Posts

Fujifilm X-T5: everything we know so far and what we want to see
Technology

Fujifilm X-T5: everything we know so far and what we want to see

by Timothy Wilson
20.07.2022
This devious attack turns a SATA cable into a data-stealing antenna
Technology

This devious attack turns a SATA cable into a data-stealing antenna

by Timothy Wilson
20.07.2022
Twitter could be banned in Indonesia if failing to comply with new law
Technology

Twitter could be banned in Indonesia if failing to comply with new law

by Timothy Wilson
20.07.2022
This creepy macOS backdoor spies on you without you noticing
Technology

This creepy macOS backdoor spies on you without you noticing

by Timothy Wilson
20.07.2022
Namecheap introduces vault-like domain security protection tool
Technology

Namecheap introduces vault-like domain security protection tool

by Timothy Wilson
20.07.2022
Next Post

Android tablets are getting a feature that'll make them fantastic iPad rivals

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Premium Content

Many firms say they wouldn’t pay ransomware if they had to disclose it publicly

22.12.2021
The Moneyist: ‘We’re concerned this woman may persuade him to leave his house to her’: My father, 85, moved in with a female friend. How do we stop her taking his money?

The Moneyist: ‘We’re concerned this woman may persuade him to leave his house to her’: My father, 85, moved in with a female friend. How do we stop her taking his money?

27.03.2022
Wait, is Microsoft tempting kids away from Chrome with Minecraft money?

Wait, is Microsoft tempting kids away from Chrome with Minecraft money?

22.06.2022

Browse by Category

  • Business
  • Finance
  • Stock Market
  • Technology

Browse by Tags

Europe Oleg Volin Russia Ukraine

Fintedex delivers real-time news about the financial industry: feature stories, industry developments, opinions plus the latest on people and trends.

Categories

  • Business
  • Finance
  • Stock Market
  • Technology

Browse by Tag

Europe Oleg Volin Russia Ukraine

Recent Posts

  • Fujifilm X-T5: everything we know so far and what we want to see
  • This devious attack turns a SATA cable into a data-stealing antenna
  • How American banks are responding to rising interest rates

© 2021 Fintedex.

No Result
View All Result
  • Contact
  • Submit a News Releases

© 2021 Fintedex.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?