Pink botnet infected over 1.5 ล้านอุปกรณ์
The Netlab Qihoo 360 research team reports that it has discovered the “largest botnet” in the past six years – Pink malware has already infected more than 1.6 ล้านอุปกรณ์, mostly located in China (96%).
These bots are used by botnet operators for DDoS attacks and injecting ads on HTTP sites. It is reported that at least 100 DDoS attacks have been carried out by the botnet to date.
ตามที่ผู้เชี่ยวชาญ, Pink has been active since November 2019. The malware mainly attacks MIPS routers and uses various third-party services, รวมทั้ง GitHub, as well as P2P and centralized C&C servers to connect bots with operators and transfer commands.
Pink is a hybrid architecture botnet that uses both “P2P” and central “C2″ to communicate to its bots. Overall, it delivers less time-sensitive commands (e.g. management configuration information) via P2P, while more time-sensitive commands are distributed centrally via the C2s (e.g. launching ddos attacks, inserting advertisements into HTTP websites visited by users).เน็ตแล็บ Qihoo 360 experts told.
Pink also uses DNS-Over-HTTPS to connect to the server specified in the configuration file, which is either delivered via GitHub or Baidu Tieba (sometimes the domain name is completely hardcoded).
Pink’s operators fought with the supplier to control the infected devices: while the supplier made repeated attempts to fix the problem, the master bot detected the supplier’s actions in real time and repeatedly updated the firmware of the routers accordingly.the analysts say.
According to another Chinese company, NSFOCUS, the malware spreads through the exploitation of 0-วัน vulnerabilities in network devices. And although today a significant proportion of such devices have been fixed and restored to their previous state, the botnet is still active and consists of no less than 100,000 devices.
Let me remind you that we also talked about the fact that the ทางการจีนได้จับกุมผู้เขียน โรงหนัง บ็อตเน็ต.