Category: IT|Jan 1, 2017 | Author: Admin

Rakos Malware Is Infecting Linux Servers And IoT Devices To Build Botnet Army

Share on

Your smart devices aren’t as smart as you think. After Mirai botnet, another similar malware named Rakos is here to compromise your IoT security. Rakos exploits the weak passwords and targets the SSH ports. Only time will tell if Rakos can turn out to be another massive threat like Mirai botnet.

Your smart devices aren’t as smart as you think. After Mirai botnet, another similar malware named Rakos is here to compromise your IoT security. Rakos exploits the weak passwords and targets the SSH ports. Only time will tell if Rakos can turn out to be another massive threat like Mirai botnet.

In case you’re facing a problem of your embedded devices going overloaded with networking and computing tasks, there are chances that it might be due to some foreign elements trying to lure your ‘smart’ device into joining a botnet cult. 

The security researchers at ESET have written about multiple cases of IoT devices and Linux servers being infected with Rakos malware since August. These attacks are launched from a temporary directory — named .javaxxx, .swap, or kworker — and often disguised as a part of the Java framework.

Rakos malware performs its attacks via brute force attempts at SSH logins. This method isn’t new and many other Linux worms operate using the same vector. By attacking the embedded devices and servers with open SSH port and weak passwords, Rakos aims to assemble a botnet army.

The users have also reported that instead of having a strong password, their device was infected. This was possible as the target device had online service enabled and the password was reverted to default after a factory reset.

The notorious Mirai malware works just like Rakos. But, Mirai commonly targets telnet ports instead of SSH.

Rakos is written in Go language and it’s binary is compressed using standard UPX tool. If the attack is successful, Rakos downloads binary to the host and starts a local web server on port 61314.

From time to time, Rakos keeps sending the details of the host machine to its C&C server, allowing it to add new features and perform any new operation.

At the moment, Rakos looks like massive botnet in the making. To make sure that your smart device doesn’t turn out to be dumb, change the default password, and close the unwanted doors.

Did you find this article on Rakos malware useful? Don’t forget to drop your views and feedback in the comments section.

 

Sponsored Ads:

Comments:


Microsoft is ending Edge support on computers without SSE3

Category: Microsoft|May 18, 2024 | Author: Admin

Gratulerer med 17. mai!

Category: General|May 17, 2024 | Author: Admin

Now many can try Android 15

Category: Google|May 16, 2024 | Author: Admin

Apple has released iOS 17.5

Category: Apple|May 15, 2024 | Author: Admin

Toshiba demonstrates 30TB+ HDDs using HAMR and MAMR technologies — customer sampling scheduled for 2025

Category: IT|May 14, 2024 | Author: Admin

Microsoft’s free PC optimizer makes it easier to free up storage space

Category: Microsoft|May 13, 2024 | Author: Admin

Stack Overflow Users Are Revolting Against an OpenAI Deal

Category: IT|May 12, 2024 | Author: Admin

ChatGPT is probably coming to the iPhone

Category: Apple|May 11, 2024 | Author: Admin

April Windows Server updates also cause crashes, reboots

Category: Microsoft|May 10, 2024 | Author: Admin

Apple skin braided after advertising stunt

Category: Apple|May 9, 2024 | Author: Admin

"RTX 5080 coming this fall"

Category: IT|May 8, 2024 | Author: Admin

Sorry, but it will stop on October 14, 2025

Category: Microsoft|May 7, 2024 | Author: Admin

Microsoft announces new security services and features for AI deployments

Category: Microsoft|May 6, 2024 | Author: Admin

Can force Facebook to allow it

Category: IT|May 5, 2024 | Author: Admin

Siri can no longer tell the clock

Category: Apple|May 4, 2024 | Author: Admin
more