A new botnet is being spread among Linux-based servers running the system configuration tool Webmin. Dubbed as Roboto by Qihoo 360’s Netlab team, who tracked the botnet over a three-month period, it exploits CVE-2019-15107 , a remote code execution vulnerability that could potentially allow an attacker to execute malicious commands with root privileges. Although this bug has since been patched by Webmin developers starting with version 1.930 (released on August 17, 2019), servers running versions 1.882 to 1.921 are at risk of being infected by the Roboto botnet.
Numerous features, spreads via peer-to-peer connections
According to Netlab’s analysis , Roboto comes with multiple capabilities: distributed denial-of-service (DDoS); reverse shell functionalities; collection of system and network information; execution of system commands; running encrypted files downloaded from a command-and-control (C&C) server; uploading data to the C&C server; uninstalling itself. It also uses a number of algorithms for securing its components and its peer-to-peer (p2p) network. In addition, the researchers mentioned that it is likely that the botnet comes with vulnerability scanning and control modules.
Despite Roboto being able to perform four different types of DDoS attacks (ICMP Flood, HTTP Flood, TCP Flood, and UDP Flood), the researchers were unable to find any trace of an actual DDoS attempt occurring. It is possible that the threat actors behind the botnet are concentrating on growing it in size before attempting an attack.
An interesting aspect of Roboto is that it does not use a centralized method for spreading itself to other machines by receiving commands directly from its C&C server. Instead, it uses a p2p system in which commands are sent directly from one machine to another.
Recommendations and Trend Micro solutions
Organizations running the affected Webmin versions should update their apps to the latest iteration (1.930 at the time of writing) that contains a fix for CVE-2019-15107. Given the prevalence of malware variants that exploit vulnerabilities, it is highly recommended that companies update their software and systems to the latest versions to minimize the chances of their own machines being infected.
Given the popularity of tools like Webmin in software development, organizations are also encouraged to strengthen their overall security by using technology such as Trend Micro DevOps security solutions , which bake security into the development process, allowing for more efficient development cycles while minimizing human touch points and errors.
Businesses can also consider the Trend Micro ™ Deep Discovery ™ solution, which provides detection, in-depth analysis, and proactive response to attacks that use exploits through specialized engines, custom sandboxing , and seamless correlation across the entire attack lifecycle, allowing it to detect attacks even without any engine or pattern update.
It also includes the Trend Micro Deep Discovery Inspector, which protects customers from attacks that exploit CVE-2019-15107 via the following DDI rule:
The Trend Micro Deep Security™ solution also protects systems and users from threats targeting CVE-2019-15107 via the following Deep Packet Inspection (DPI) rule:
Like it? Add this infographic to your site:1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
In the first half of this year, cybersecurity strongholds were surrounded by cybercriminals waiting to pounce at the sight of even the slightest crack in defenses to ravage valuable assets. View the report
The upheavals of 2020 challenged the limits of organizations and users, and provided openings for malicious actors. A robust cybersecurity posture can help equip enterprises and individuals amid a continuously changing threat landscape. View the 2020 Annual Cybersecurity Report
cvv dump sites dumps and pins