Today > 1 Critical | 6 High | 24 Medium vulnerabilities   -   You can now download lists of IOCs here!

cShell DDoS Bot Attack Case Targeting Linux SSH Server (screen and hping3)

Dec. 20, 2024, 2:41 p.m.

Description

A new DDoS malware strain named cShell is targeting poorly managed Linux servers through SSH services. The threat actor uses brute force attacks to gain initial access, then installs the cShell bot developed in Go language. cShell exploits Linux tools 'screen' and 'hping3' to perform various DDoS attacks. It supports multiple DDoS commands, including SYN, ACK, and UDP floods. The malware maintains persistence by registering as a service and can update itself using Pastebin URLs. cShell's simple design leverages existing Linux tools, making it an effective DDoS bot. To protect against such attacks, administrators should use strong passwords, regularly update systems, and implement security measures like firewalls.

Date

Published: Dec. 20, 2024, 2:22 p.m.

Created: Dec. 20, 2024, 2:22 p.m.

Modified: Dec. 20, 2024, 2:41 p.m.

Indicators

781b4790834757804bd0e80ce5d8180155cac6fc8952cd03d8f824ccba376058

Attack Patterns

cARM

cShell

T1543.002

T1021.004

T1568

T1571

T1059.004

T1105

T1036

T1498

T1190

T1133

T1078

T1072