XORDdos malware targets Linux devices

Hackers are increasingly deploying Xor Ddos malware to infiltrate Linux systems and initiate distributed denial of service (“DDoS)attack. Violation attempts have increased significantly in recent months. Due to the open source nature of Linux, Linux is a major target for such malware, especially when running on the Internet of Things ().IoT) Connected devices that have been patched for security updates. The new law announced this month may help address the issue.

The XorDdos malware targets devices built on Linux. (Photo by Inimma-IS / iStock)

Xor Ddos, called the use of the XOR encryption algorithm, is used to perform “SSH brute force” attacks and attempt to process the login credentials of the device. “They are trying to rely on the fact that people aren’t protecting these devices,” says Barra Tomystry, UK and Ireland technical director of security company Trend Micro. “In some cases, it may just be the default password.”

Although not new malware, Xor Ddos is increasingly being targeted Linux System says Microsoft’s Defender 365 Security Team, Shows a 254% increase in hacking attempts using malware on Linux systems over the last 6 months. “By endangering the IoT and other Internet-connected devices, Xor Ddos accumulates botnets that can be used to carry out distributed denial of service attacks,” a new Microsoft report said.

Why is Linux vulnerable to Xor Ddos?

Linux’s open source model means it’s commonly used to support IoT devices and cloud infrastructure. However, this has its drawbacks when it comes to security. “Linux is different from Windows. Microsoft It controls the build, “says Mistry. “that is Open Source This means that different groups of people will adopt the base build and then fork off to perform their own variations. “

For IoT device manufacturers, getting to market quickly is often a priority over security, says Mistry. The manufacturer is not responsible for providing security updates once the device is up and running. “We rely on someone who doesn’t really make money to make sure everything is up to date,” he says. “From the vendor’s point of view, that’s all there is to the market.”

This means that “hundreds of millions of smart devices” are at stake, Mistry claims. “There are light bulbs, fans, kettles, refrigerators, doorbells” are all running on Linux and are often inadequately secure. And he says, “The problem will grow.” He explains: “No matter what we do to avoid or mitigate these issues, this issue will continue unless the software is developed and safely developed. It just escalate.”

Why are DDoS attacks so common?

DDoS attacks have skyrocketed in popularity in recent months as a simple weapon used by ransomware gangs and other cybercriminals. DDoS attacks were the primary weapon deployed against Ukraine at the beginning of the invasion For example, by Russia. DDoS attacks are so popular with ransomware gangs that their use is ” “Mie blackmail.”

Content from partners
Incumbent banks need to change quickly. Otherwise, you will miss the benefits of open banking.

Leverage the cloud and expertise to optimize engagement from onboarding to conclusions

How Enterprises Get Best Prepared for Financial Digitalization

Unleashed as part of a DDoS attack, botnets are not only growing, but the technology that underpins their use is becoming more sophisticated. “They started very early as a very simple attack, but now they are more sophisticated,” says Mistry. “Looking at the latest, some of those botnets are targeting the application layer. They are difficult to evade and, from an attacker’s point of view, do not require much resources.”

XorDdos Malware: How Can Enterprises Protect themselves?

Mistry says there are ways businesses can protect themselves. “If you buy a cloud service, make sure that the person who buys the service regularly maintains and updates the platform,” he says.

For IoT devices, new regulations may help improve security.As reported by Tech Monitor, Product Security and Telecommunications Infrastructure Bill Introduced in Queen’s Speech Earlier This Month, Require manufacturers to remove the default password and commit a certain amount of security updates. Regulatory pressure requires IoT device manufacturers to have some degree of security, “says Mistry.

read more: INCONTROLLER malware helps low-skilled gangs access critical systems XORDdos malware targets Linux devices

Back to top button