Car Hacking: More likely to be done by a mechanic than by a hacker
infosec

Car Hacking: More likely to be done by a mechanic than by a hacker

When we talk about car hacking, it comes to mind a hacker who gets remote access to the car system ...
Read More
infosec

Sri Lanka: Blocks access to social media

The government of Sri Lanka has temporarily blocked access to various social media services following deadly explosions that erupted ...
Read More
infosec tweaks

How to hack networks with Wi-Fi passwords

Probably you have a Wi-Fi network in your home or stay close to one (or more) that appears in ...
Read More
infosec tweaks

What is Social Engineering, what are its techniques and how to protect yourself?

Social Engineering is the term used for a wide range of malicious activities that are accomplished through human interactions. Uses the ...
Read More
infosec tweaks

Cryptocurrency: Ways to Enhance Your Privacy

Privacy and privacy on the internet are of great importance. It is not enough to take one or two measures to protect ...
Read More
Latest Posts

LuaBot: Botnet Malware written in Lua and targets Linux!

A trojan with code written in Lua targets Linux platforms to add them to a global botnet, said yesterday, security researcher MalwareMustDie.

After the security issue with the Mirai DDoS trojan that again targeted Linux systems comes a new attack against the operating system.

LuaBot is in the same category as Mirai because its primary purpose is to compromise Linux systems, IoT devices or web servers and add them as bots into a larger botnet that is controlled by the attacker.

LuaBot: Botnet Malware written in Lua and targets Linux!

At the moment, the purpose of this botnet is unknown, but MalwareMustDie he told Softpedia on Twitter that the code for launching packet floods (DDoS attacks) is there, only that was not able to confirm its functionality yet.

Currently, the LuaBot trojan is packed as an ELF binary that targets ARM platforms, usually found on built-in (IoT) devices. Based on his experience, this seems to be the first malicious software by Take the malware family packed as a binary ELF that also spreads to Linux platforms.

Unlike Mirai, which is the fruit of a systematic two-year coding, LuaBot is in the early stages of its development, with its first detection reported only a week ago and with no virus detection at VirusTotal for current samples.

Since this is one malware only a week, the data is scarce about its distribution and its mechanism of contamination.

MalwareMustDie has been able to perform reverse engineer for some of the trojan code and discovered that the bot is communicating with a C & C server hosted in the Netherlands under the infrastructure of a dedicated server hosting service, WorldStream.NL.

In addition, the investigator found that the provocative LuaBot maker left a message behind for all infosec professionals who are trying to understand his code. The message is as follows: "Hi. Happy reversing, you can mail me: [REDACTED .ru email address]«

Finally, MMD also discovered a code called "penetrate_sucuri", suggesting that it has features that can shame its famous Web Application Firewall Sucuri, a cyber-security product that has stopped many web threats in the past.

penetrated firewall juices

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *