Pink botnet infected over 1.5 juta peranti

The Netlab Qihoo 360 research team reports that it has discovered thelargest botnetin the past six yearsPink malware has already infected more than 1.6 juta peranti, mostly located in China (96%).

These bots are used by botnet operators for DDoS attacks and injecting ads on HTTP sites. It is reported that at least 100 DDoS attacks have been carried out by the botnet to date.

Pink botnet

According to experts, Pink has been active since November 2019. The malware mainly attacks MIPS routers and uses various third-party services, including GitHub, as well as P2P and centralized C&C servers to connect bots with operators and transfer commands.

Pink is a hybrid architecture botnet that uses bothP2Pand central “C2to communicate to its bots. Keseluruhannya, it delivers less time-sensitive commands (e.g. management configuration information) via P2P, while more time-sensitive commands are distributed centrally via the C2s (e.g. launching ddos attacks, inserting advertisements into HTTP websites visited by users).Netlab Qihoo 360 experts told.

Pink also uses DNS-Over-HTTPS to connect to the server specified in the configuration file, which is either delivered via GitHub or Baidu Tieba (sometimes the domain name is completely hardcoded).

Pink’s operators fought with the supplier to control the infected devices: while the supplier made repeated attempts to fix the problem, the master bot detected the supplier’s actions in real time and repeatedly updated the firmware of the routers accordingly.the analysts say.
According to another Chinese company, NSFOCUS, the malware spreads through the exploitation of 0-hari vulnerabilities in network devices. And although today a significant proportion of such devices have been fixed and restored to their previous state, the botnet is still active and consists of no less than 100,000 devices.

Let me remind you that we also talked about the fact that the Chinese authorities have arrested the authors of the Mozi botnet.

Helga Smith

Saya sentiasa berminat dalam sains komputer, terutamanya keselamatan data dan tema, yang dipanggil pada masa kini "sains data", sejak awal remaja saya. Sebelum menyertai pasukan Pembuangan Virus sebagai ketua Editor, Saya bekerja sebagai pakar keselamatan siber di beberapa syarikat, termasuk salah seorang kontraktor Amazon. Satu lagi pengalaman: Saya ada mengajar di universiti Arden dan Reading.

Tinggalkan pesanan

Laman web ini menggunakan Akismet untuk mengurangkan spam. Ketahui cara data ulasan anda diproses.

Butang kembali ke atas