Pink botnet infected over 1.5 million devices

The Netlab Qihoo 360 research team reports that it has discovered the “largest botnet” in the past six years – Pink malware has already infected more than 1.6 million devices, mostly located in China (96%).

These bots are used by botnet operators for DDoS attacks and injecting ads on HTTP sites. It is reported that at least 100 DDoS attacks have been carried out by the botnet to date.

Pink botnet

According to experts, Pink has been active since November 2019. The malware mainly attacks MIPS routers and uses various third-party services, including GitHub, as well as P2P and centralized C&C servers to connect bots with operators and transfer commands.

Pink is a hybrid architecture botnet that uses both “P2P” and central “C2″ to communicate to its bots. Overall, it delivers less time-sensitive commands (e.g. management configuration information) via P2P, while more time-sensitive commands are distributed centrally via the C2s (e.g. launching ddos attacks, inserting advertisements into HTTP websites visited by users).Netlab Qihoo 360 experts told.

Pink also uses DNS-Over-HTTPS to connect to the server specified in the configuration file, which is either delivered via GitHub or Baidu Tieba (sometimes the domain name is completely hardcoded).

Pink’s operators fought with the supplier to control the infected devices: while the supplier made repeated attempts to fix the problem, the master bot detected the supplier’s actions in real time and repeatedly updated the firmware of the routers accordingly.the analysts say.
According to another Chinese company, NSFOCUS, the malware spreads through the exploitation of 0-day vulnerabilities in network devices. And although today a significant proportion of such devices have been fixed and restored to their previous state, the botnet is still active and consists of no less than 100,000 devices.

Let me remind you that we also talked about the fact that the Chinese authorities have arrested the authors of the Mozi botnet.

Helga Smith

I was always interested in computer sciences, especially data security and the theme, which is called nowadays "data science", since my early teens. Before coming into the Virus Removal team as Editor-in-chief, I worked as a cybersecurity expert in several companies, including one of Amazon's contractors. Another experience: I have got is teaching in Arden and Reading universities.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button