‘Outlaw’ threat actor uses Shellbot variant to form new botnet
#1
Quote:An unknown threat actor has been targeting organizations with botnet malware that communicates with its command-and-control server via the Internet Relay Chat application layer protocol.

Nicknamed Outlaw, the hacking group developed the botnet as a Perl language-based variant of Shellbot, according to a Nov. 1 blog post from Trend Micro, whose researchers uncovered the threat. Shellbot is a trojan horse malware that’s typically installed on computers via the Shellshock Unix Bash shell vulnerability that was found back in 2014.

In this case, however, the Perl Shellbot attackers are instead infecting victims via a command injection vulnerability that’s commonly found on IoT devices and Linux servers, but can also affect Windows environments and Android devices. They are also distributing the malware through previously brute-forced or compromised hosts, Trend Micro notes.

Source: https://www.scmagazine.com/home/security...ew-botnet/
[-] The following 2 users say Thank You to silversurfer for this post:
  • harlan4096, jasonX
Reply


Messages In This Thread
‘Outlaw’ threat actor uses Shellbot variant to form new botnet - by silversurfer - 02 November 18, 12:34

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Cloudflare CEO warns AI bots could outnu...
The internet you use...schreckdeividas — 11:03
ScreenToGif 2.43.1
ScreenToGif 2.43.1...harlan4096 — 08:55
uBOLite 2026.322.1735 (already available...
uBOLite 2026.322.1...harlan4096 — 08:54
Microsoft outs Windows 11 KB5085516 to f...
This month, Micros...harlan4096 — 08:53
AV-Test - Awards 2025: celebrating the v...
V-TEST Awards 2025...harlan4096 — 08:50

[-]
Birthdays
Today's Birthdays
avatar (44)battsourIonix
avatar (43)CedricSek
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (46)qaqapeti
avatar (43)artmaGoork

[-]
Online Staff
There are no staff members currently online.

>