cShell DDoS Bot Attack Case Targeting Linux SSH Server (screen and hping3)
Dec. 20, 2024, 2:41 p.m.
Tags
External References
Description
A new DDoS malware strain named cShell is targeting poorly managed Linux servers through SSH services. The threat actor uses brute force attacks to gain initial access, then installs the cShell bot developed in Go language. cShell exploits Linux tools 'screen' and 'hping3' to perform various DDoS attacks. It supports multiple DDoS commands, including SYN, ACK, and UDP floods. The malware maintains persistence by registering as a service and can update itself using Pastebin URLs. cShell's simple design leverages existing Linux tools, making it an effective DDoS bot. To protect against such attacks, administrators should use strong passwords, regularly update systems, and implement security measures like firewalls.
Date
Published: Dec. 20, 2024, 2:22 p.m.
Created: Dec. 20, 2024, 2:22 p.m.
Modified: Dec. 20, 2024, 2:41 p.m.
Indicators
781b4790834757804bd0e80ce5d8180155cac6fc8952cd03d8f824ccba376058
Attack Patterns
cARM
cShell
T1543.002
T1021.004
T1568
T1571
T1059.004
T1105
T1036
T1498
T1190
T1133
T1078
T1072