New « B1txor20 » Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw
,
A previously undocumented backdoor has been observed targeting Linux systems with the goal of corralling the machines into a botnet and acting as a conduit for downloading and installing rootkits.
Qihoo 360’s Netlab security team called it B1txor20 « based on its propagation using the file name ‘b1t,’ the XOR encryption algorithm, and the RC4 algorithm key length of 20 bytes. »
<!–adsense–>
Qihoo 360’s Netlab security team called it B1txor20 « based on its propagation using the file name ‘b1t,’ the XOR encryption algorithm, and the RC4 algorithm key length of 20 bytes. »
<!–adsense–>
,
A previously undocumented backdoor has been observed targeting Linux systems with the goal of corralling the machines into a botnet and acting as a conduit for downloading and installing rootkits.
Qihoo 360’s Netlab security team called it B1txor20 « based on its propagation using the file name ‘b1t,’ the XOR encryption algorithm, and the RC4 algorithm key length of 20 bytes. »
<!–adsense–>
Qihoo 360’s Netlab security team called it B1txor20 « based on its propagation using the file name ‘b1t,’ the XOR encryption algorithm, and the RC4 algorithm key length of 20 bytes. »
<!–adsense–>
, ,
https://thehackernews.com/2022/03/new-b1txor20-linux-botnet-uses-dns.html