‘RapperBot’ Botnet Uses Brute Force To Gain Access To Linux SSH Servers

Share post:

Threat hunters at Fortinet have discovered a new botnet called “RapperBot” that brute-forces its way into Linux SSH servers.

The botnet has used more than 3,500 unique IP addresses worldwide to scan and brute-force Linux SSH servers since it was first used in attacks in mid-June 2022.

RapperBot was discovered after researchers noticed that the IoT malware had some unusual SSH-related strings. Further research shows that RapperBot is a Mirai fork that comes with its own command and control (C2) protocol, unique features and atypical (for a botnet) post-compromise activity.

To brute-force SSH, the botnet relies on a list of credentials downloaded from the C2 via host-unique TCP requests, which are reported back to the C2 after intrusion.

“Unlike the majority of Mirai variants, which natively brute force Telnet servers using default or weak passwords, RapperBot exclusively scans and attempts to brute force SSH servers configured to accept password authentication. The bulk of the malware code contains an implementation of an SSH 2.0 client that can connect and brute force any SSH server that supports Diffie Hellmann key exchange with 768-bit or 2048-bit keys and data encryption using AES128-CTR,” the Fortinet report states.

The goal of RapperBot, however, remains unknown, as the authors kept its DDoS functionality limited and even removed an re-introduced them at some point.

However, the elimination of self-propagation and the addition of persistence and detection avoidance mechanisms show that the operators of the botnet might be interested in selling initial access to ransomware actors.

The sources for this piece include an article in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Controversial expansion of US surveillance powers nears Senate vote

The US Senate is poised to vote on a significant expansion of Section 702 of the Foreign Intelligence...

Russian-linked hackers target U.S. and European water systems

A Russian military-affiliated hacking group, Sandworm, is suspected of coordinating recent cyberattacks on water utilities in the U.S.,...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways