banner Expire 1 July 2024
Ad Ends 13 April 2024
banner Expire 15 July 2024
banner Expire 18 April 2024
ad End 18 October 2024
Ad Ends 13 July 2023
banner Expire 20 May 2024
What's new
Ad expire at 5 May 2024
UniCvv
CrdCrew.cc Carding forum
Western union transfer
banner expire at 21 August

Carding.pw carding forum
adv exp at 23 may

FritzFrog botnet infected at least 500 government and corporate servers

Daniel

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
6,504
Reaction score
890
Points
212
Awards
2
  • trusted user
  • Rich User
The main goal of FritzFrog is cryptocurrency mining.




Guardicore Labs has published a report on the activity of the relatively new P2P botnet FritzFrog, which in 2020 managed to infect at least 500 government and corporate SSH servers.

The botnet was first spotted in January this year. Over the past eight months, FritzFrog has carried out multiple brute force attacks on SSH servers belonging to government agencies, telecommunications, financial companies, and healthcare and education companies around the world. At least 500 attacks were successful.

FritzFrog is a decentralized botnet that uses P2P protocols to manage its nodes.

After the SSH server is hacked, fileless malware is loaded onto the system and executed only in memory, turning the device into a bot capable of receiving and executing commands. The FritzFrog malware is unpacked on the system under the names ifconfig and nginx and is launched as a command-pending startup process listening on port 1234. These commands are easy enough to detect, so the attackers connect to the victim via SSH and launch the Netcat client.

All commands are transmitted in encrypted form. The first connects the device to an existing botnet, while the rest are used to install the backdoor, monitor the network, PC and CPU resources.

The main goal of FritzFrog is cryptocurrency mining. To do this, the botnet uses Monero mining software called XMRig. If the processes on the server are using too many CPU resources, FritzFrog will terminate them to provide power to the miner.

According to experts, FritzFrog uses a proprietary P2P protocol, which may indicate the high professionalism of its developers. Guardicore Labs was unable to find concrete evidence of any group's involvement in the botnet, but they did find some similarities between FritzFrog and the Rakos botnet discovered in 2016.

__________________
 
Ad End 1 July 2024
Top