Monday, July 6, 23:51 p.m.
Home security Robot Botnet infects Linux Webmin Servers

Robot Botnet infects Linux Webmin Servers


A new series of malicious Roboto Botnet activities has come to light, exploiting RCE's vulnerability to attack its Webmin servers Linux.

The first to discover the Roboto Botnet was Netlab360, which characterized it as an ELF (Executable Linkable Format) file. The first discovery was made in August, and later Honeypot also detected another sample of suspected ELFs, which served as downloader to download that bot.

In the last three months, the researchers security are constantly monitoring Roboto's movements and activities to discover his goals and methods.

It has been discovered that Roboto Botnet uses algorithms such as Curve25519, Ed25519, TEA, SHA256, HMAC-SHA256 to maintain its integrity, protect and gain persistent control over Linux Webmin servers.

According to the researchers: “the botnet has functionality DDoS, but it seems that DDoS attacks are not its main purpose. We haven't detected any DDoS attacks since we discovered it. We still need to know its true purpose. ”

Researchers observed the spread of Roboto via (Webmin Honeypot service) and the sample of the downloader spreading through Webmin RCE vulnerability (CVE-2019-15107).

The http: // / boot URL helps spread it payload.

The main purpose of the Roboto downloader is to download the encrypted Roboto Bot program from a specific address URL. Later the malicious program will decrypt it and execute it.

Roboto Botnet can perform a variety of advanced functions, such as reverse shell, automatic uninstall, network information collection, information collection muzzle, executing system commands, executing encrypted files that specialize in URLs, DDoS attacks, and more.

Roboto enables a DDoS attack to be executed by the following methods:

CMP Flood

HTTP Flood

TCP Flood

UDP Flood

Netlab360 recommends Webmin users to check if they are infected, checking the process, file name and UDP network connection and blocking all IPs, URLs and domain names related to Botnet.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Windows 10 2004: Unauthorized settings "block" the upgrade

Users report that they have a problem with Windows 10, since they are excluded from the application of the May 2020 update, when they manually attempt to ...

Lenovo is improving Linux ThinkPads but the problems remain

Last month, when Lenovo announced that it was going to certify the ThinkPad series for use with Linux operating systems, we thought directly ...

Nigerian accused of fraud against US companies

A Nigerian was taken to the federal court in Chicago on Friday, after being accused of coordinating an international cyber fraud system, which affected ...

Home routers display critical errors and run unpatched Linux

The German Fraunhofer Communication Institute (FKIE) conducted a survey that included 127 home routers from seven different brands, in an effort to ...

IPhone 12 release: Will we finally see it by the end of 2021?

New data on the release of the iPhone 12, which we all expect not to happen in September, say that it will only be delayed ...

MySQL: Replaces terms that reinforce racial discrimination

MySQL database developers have announced that they will be replacing terminology such as master, slave, blacklist, and whitelist.

The CEO of a cryptocurrency investment company was cheating

As reported by News24, Willie Breedt, the founder of VaultAge Solutions (cryptocurrency investment company), declared bankruptcy last week and the ...

United Kingdom: Will it exclude Huawei from its 5G networks?

The UK government has received an NCSC report on Huawei, which may change its policy ...

A Yahoo engineer is not in jail after hacking 6.000 accounts

A former Yahoo engineer has been sentenced to five years in prison for hacking into personal accounts ...

PoC exploits released for critical vulnerability on F5 BIG-IP devices

PoC exploits released for critical vulnerability on F5 BIG-IP devices Two days after the release of updates on critical vulnerability on F5 ...