FritzFrog botnet returns to strike healthcare, education, government sectors


imageThe FritzFrog botnet has reappeared with a new P2P campaign, showing growth of 10x within only a month.

FritzFrog is a peer-to-peer botnet discovered in January 2020.Over a period of eight months, the botnet managed to strike at least 500 government and enterprise SSH servers.

ZDNet Recommends Best VPN services Best security keys Best antivirus software The fastest VPNs The P2P botnet, written in the Golang programming language, is decentralized in nature and will attempt to brute-force servers, cloud instances, and other devices — including routers — that have exposed entry points on the internet.

On Thursday, cybersecurity researchers from Akamai Threat Labs said that despite having gone quiet after its previous attack wave, since December, the botnet has reappeared with an exponential growth surge.

“FritzFrog propagates over SSH,” the researchers say.”Once it finds a server’s credentials using a simple (yet aggressive) brute force technique, it establishes an SSH session with the new victim and drops the malware executable on the host.The malware then starts listening and waiting for commands.”

In total, 24,000 attacks have been detected to date.

And 1,500 hosts have been infected, the majority of which are located in China.The botnet is used to mine for cryptocurrency.

Healthcare, education, and government sectors are all on the target list.Thanks to new functionality and the usage of a proxy network, the malware is also being prepared to hone in on websites running the WordPress content management system (CMS).

A TV channel in Europe, a Russian healthcare equipment manufacturer, and universities in Asia have been compromised.

Akamai considers FritzFrog a “next-generation” botnet due to a number of key features.This includes consistent update and upgrade cycles, an extensive dictionary used in brute-force attacks, and its decentralized architecture, which is described as “proprietary.” In other words, the botnet doesn’t rely on other P2P protocols to function.

The latest FritzFrog is updated daily — sometimes more than once a day.

Alongside bug fixes, the operators have included the new WordPress function to add websites based on this CMS to a target list.

However, at the time of writing, the lists are empty, which suggests this is an attack feature in the development pipeline.

Akamai isn’t certain of the botnet’s origin, but there are some indicators that the operators are either based in China or are impersonating operators in the country.A newly-added file transfer library, for example, links to a GitHub repository owned by a user in Shanghai.

In addition, the botnet’s cryptocurrency mining activity links to wallet addresses also used by the Mozi botnet, in which operators were arrested in China.

The cybersecurity firm has provided a FritzFrog detection tool on GitHub .

Mirai splinter botnets dominate IoT attack scene

This ransomware-spreading malware botnet just won’t go away

Dark web crooks are now teaching courses on how to build botnets


Leave a Reply

Your email address will not be published. Required fields are marked *

Next Post

Chrono Trigger pseudo-sequel Chrono Cross is being remastere

Chrono Trigger pseudo-sequel Chrono Cross is being remastered for the Nintendo Switch.It’s scheduled to launch on April 7. Advertisement The original Chrono Cross first released for the PlayStation in 1999, giving Chrono Trigger fans a chance to return to the world of the iconic Super Nintendo role-playing game.It stars Serge, […]
Chrono Trigger pseudo-sequel Chrono Cross is being remastere

Subscribe US Now