Close Menu
  • Identity
  • Startups
  • Tech
  • Spanish
What's Hot

Openai pulls promotional material around Jony Ive deals by court order

Bitcoin Iran attack crypto market sale

Tesla launches Robotaxi vehicle in Austin with big promises and unanswered questions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Identity
  • Startups
  • Tech
  • Spanish
Fyself News
Home » Experts discover new Xordos controllers, infrastructure as malware expands to Docker, Linux and IoT
Identity

Experts discover new Xordos controllers, infrastructure as malware expands to Docker, Linux and IoT

userBy userApril 18, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 18, 2025Ravi LakshmananIoT Security/Malware

New Xorddos Controller, Infrastructure

Cybersecurity researchers have warned of the ongoing risk posed by the distributed denial of service (DDOS) malware known as Xorddos, with 71.3% of attacks targeting the US between November 2023 and February 2025.

“The prevalence of Xorddos Trojan has increased significantly from 2020 to 2023,” Cisco Talos researcher Joey Chen said in an analysis Thursday.

Cybersecurity

“This trend is due to the increased malicious DNS requests linked to command and control (C2) infrastructure, as well as the widespread global distribution of Xordos Trojans. In addition to targeting exposed Linux machines, Trojans have expanded their reach to Docker servers and converted infected hosts into bots.

Almost 42% of compromised devices are in the US, followed by Japan, Canada, Denmark, Italy, Morocco and China.

Xorddos is a well-known malware with a proven track record of Striking Linux systems for over 10 years. In May 2022, Microsoft reported a significant surge in Xorddos activity, and infectious diseases paved the way for cryptocurrency mining malware, such as tsunamis.

The main initial access route involves carrying out a secure shell (SSH) brute force attack, obtaining valid SSH credentials, and downloading and installing malware on vulnerable IoT and other internet-connected devices.

Once the scaffolding is successfully established, the malware uses built-in initialization scripts and Cron jobs to set up persistence, allowing it to start automatically on system startup. It also uses the XOR key “BB2FA36AAA9541F0” to decrypt the configuration that exists within itself to extract the IP address required for C2 communication.

Cybersecurity

Talos has observed a new version of the Xorddos subcontroller, known as the VIP version in 2024, along with its corresponding central controller and builder, indicating that the product is likely to be advertised for sale.

The central controller is responsible for managing multiple XordDOS subcontrollers and sending DDOS commands simultaneously. Each of these sub-controllers commands a botnet of infected devices.

“The language settings for multi-layer controllers, Xorddos builders, and controller combined tools strongly suggest that the operator is a Chinese-speaking individual,” Chen said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article“Let’s go west again”: Trump, Meloni is optimistic in EU tariff deals | Donald Trump News
Next Article The fusion of baseload energy and the decarbonized world as a future
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Openai pulls promotional material around Jony Ive deals by court order

Bitcoin Iran attack crypto market sale

Tesla launches Robotaxi vehicle in Austin with big promises and unanswered questions

Why did Danny Boyle shoot on iPhones ’28 years later?

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

How a hardware wallet protects your private key: Security and safety instructions

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.