Prolexic Security Engineering & Research Team (PLXsert) Threat Advisories
IptabLes and IptabLex DDoS Bots
Linux systems are being infiltrated via known vulnerabilities in Apache Struts, Tomcat and Elasticsearch to host IptabLes and IptabLex malware for use in DDoS botnets.
Akamai protects customers from DDoS attacks launched by these bots, but to prevent further infestation and spread of this Linux botnet, it is necessary to identify and apply corrective measures, such as those described in this threat advisory.
The IptabLes IptabLex Threat Advisory will help you understand how it works and how to protect your enterprise.
Other Recent Threat Advisories:
Blackshades RAT crimeware is used for identity theft and blackmail, allowing malicious actors to spy on users by monitoring video and audio, keylogging, harvesting banking and website access credentials, and controlling the victim machine to hijack files and to launch executables.
The Zeus toolkit is used in many types of cybercrime, including customized attacks to target Fortune 500 enterprises. Attackers leverage the resources of infected devices and extract sensitive information for identity theft and fraud. The threat advisory includes mitigation details.
Simple Network Management Protocol (SNMP) reflection tools are being used by malicious actors to harness devices such as printers, switches, firewalls and routers for use in DDoS attacks. Network administrators need to take the remediation steps described in this DDoS threat advisory.
Storm Network Stress Tester
The Storm crimeware kit infects Windows XP (and higher) systems for malicious uses and enables file uploads and downloads and the launching of executables, including four DDoS attacks. Remote access lets malicious actors use a PC for malicious activity, such as the infection of other devices.
With only a handful of vulnerable NTP servers, the current batch of NTP amplification attack toolkits enable malicious actors to launch 100 Gbps attacks – or larger.
Domain Name System (DNS) Flooder
Malicious actors are purchasing, setting up and using their own DNS servers in reflection attacks, avoiding the need to source vulnerable DNS servers on the Internet. This advisory includes a sample payload, analysis, source code, Snort rule, ACL mitigation and two case studies.
Drive, a Dirt Jumper variant
Finance and e-Commerce firms have been targeted with the Drive DDoS toolkit as a planned distraction by criminals engaging in identity theft and fraud of customer accounts. This threat advisory includes an analysis of payloads, capabilities, and IDS signatures for DDoS detection.
This threat advisory includes profiles of 11 different attack signatures, with detailed SNORT rules for DDoS mitigation; detection rules to identify infected web servers (bRobots), and a free log analysis tool (BroLog.py) that can be used to pinpoint which scripts were accessed, by what IP address, and for what DDoS targets.
Dirt Jumper Vulnerability Disclosure Report
The Dirt Jumper family of DDoS Toolkits is considered one of the most popular attack tools on the market today. This vulnerability report exposes key weaknesses in the command and control (C&C) architecture that could neutralize would-be attackers.
This Russian-origin toolkit offers five DDoS attack modes and appears to be authored by the same individual responsible for the popular and destructive Dirt Jumper family of tools.
HULK (HTTP Unbearable Load King)
This script takes advantage of common weaknesses with out-of-the-box web server functionality by launching 500 threads, which each spawn an additional 500 threads at the target web server.
Booter Shell Scripts
These sophisticated, easy-to-use DDoS attack scripts make it possible to bring down web servers without vast networks of infected zombie computers.
High Orbit Ion Cannon (HOIC)
This stealth DDoS attack tool targets up to 256 URLs simultaneously and randomizes attack signatures.
Learn about the dangers of the Dirt Jumper DDoS Toolkit for application layer attacks and download Prolexic’s free Dirt Dozer scanning tool to protect your sites.
Want PLXsert to protect you?
By identifying the sources and associated attributes of individual attacks, the PLXsert team helps organizations like yours adopt best practices and make more informed, proactive decisions about DDoS threats. PLXsert now offers a subscription service that provides current threat intelligence, infrastructure and defense evaluation, as well as post-attack forensics. To learn about other advantages of being a Prolexic subscriber, please contact firstname.lastname@example.org or call +1 (888) 368 2923.
Get access to PLXsert Cybersecurity Threat Advisories
* Required field