Tuesday, January 19, 02:47
Home security HEH botnet removes data from routers, servers and IoT devices!

HEH botnet removes data from routers, servers and IoT devices!

Recently, security researchers at Netlab (the network security division of Chinese tech giant Qihoo 360) discovered a new botnet called HEH, which contains code which can remove all data from infected systems such as routers, servers and IoT (Internet of Things) devices. The HEH botnet spreads through brute-force attacks against any internet-connected system that has its SSH ports (23 and 2323) exposed on the internet.

If the device uses default SSH credentials or SSH credentials that are easy to guess, botnet gains access to the target system, where it instantly downloads one of the seven binaries archives who install the HEH malware. This malware does not have "aggressive" features, such as the ability to run DDoS attacks, the ability to install crypto-miners or code to execute proxies.

According to ZDNet, the only features of this malware are a feature that traps infected Appliances and forces them to execute SSH brute-force attacks on the internet to help boost the botnet. This feature allows hackers execute Shell commands on the infected device. At the same time, a variant of this second feature that executes a list of predefined Shell functions removes all data from a device.

HEH was first analyzed in a report published yesterday. Because this is a relatively new botnet, Netlab researchers can't figure out if device data removal is intentional or just a self-destructive routine with "bad" encoding. But regardless of its purpose, if this feature is enabled, it could shut down hundreds or even thousands of devices.

HEH botnet removes data from routers, servers and IoT devices!

HeH targets, among others, home routers, smart IoT devices and Linux servers. The botnet can infect anything with low security SSH ports, even systems Windows. However, HEH malware only works on * NIX platforms.

In addition, HeH affects the firmware or operating system of a device, having the ability to shut down the device until the firmware or operating system is reinstalled. Some device owners may not know how to reinstall firmware on their IoT device and may simply choose to discard the old device and purchase a new one.

HEH botnet removes data from routers, servers and IoT devices!

Netlab says it has identified HEH samples that can be run on the following CPU architectures x86 (32/64), ARM (32/64), MIPS (MIPS32 / MIPS-III) and PPC. The botnet is still spreading.

HEH, although it has not disabled any device so far, would not be the first botnet to remove data from IoT devices, as have two other botnets - the BirckerBot and Flint.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

00:02:29

FCC: Extremists turn to radio equipment after banning from social media

The US government warns that extremists could turn to radio equipment to plan their future attacks, ...

Android: How to make Signal the default messaging app

Signal is a popular encrypted messaging application that focuses on privacy. It is an alternative to ...

Google Cloud: We use some SolarWinds, but we were not affected by the hack

Google Cloud CISO Phil Venables has revealed that the cloud uses software from the vendor, SolarWinds, but states that the use ...

Scotland Environment Service: ransomware continues to affect us

The Scottish Environmental Protection Agency (SEPA) has confirmed that it was hit by a ransomware attack last month and continues to face ...

Backdoors and vulnerabilities were discovered in FiberHome routers

Backdoors and other vulnerabilities have been discovered in the firmware of a popular FiberHome FTTH ONT router. FTTH ONT stands for Fiber-to-the-Home Optical Network ...

GitHub apologizes to an employee who fired! What happened;

GitHub has admitted that it was wrong to fire a Jewish official who made "anti-Nazi" comments about the Capitol riots.

By 2030 AI will replace the people of cybersecurity

Security company Trend Micro recently conducted a new survey that reveals that more than two-fifths (41%) of IT leaders believe ...

Chinese Winnti APT targets organizations in Russia and other countries!

Security researchers at Positive Technologies have uncovered a series of attacks carried out by a Chinese APT hacking team targeting organizations in Russia ...

Silicon Valley is investing a huge amount of money in India

From March to November, even when COVID-19 destroyed economies around the world, the richest man in India ...
00:02:01

Microsoft, Salesforce, Oracle are designing a digital vaccination passport

A Covid digital vaccination passport is being developed jointly by a team of health and technology companies, as well as governments, airlines and ...