BTC $51740.4000
ETH $3112.6552
BNB $388.4861
SOL $103.4699
XRP $0.5425
ADA $0.5914
AVAX $37.4726
TRX $0.1377
DOGE $0.0861
wstETH $3608.1939
LINK $18.7122
DOT $7.9253
WETH $3099.5051
UNI $11.0991
MATIC $0.9984
WBTC $51892.2111
IMX $3.2035
ICP $12.4694
LTC $70.1056
BCH $267.9077
CAKE $3.1362
FIL $8.1161
ETC $27.2027
KAS $0.1709
RNDR $7.2125
DAI $1.0003
HBAR $0.1094
ATOM $10.3766
INJ $35.7526
TON $2.0791
OKB $50.2401
VET $0.0451
FDUSD $1.0003
LDO $3.3874
GRT $0.2891
ARB $1.9019
STX $2.5976
XMR $129.3498
TIA $16.7710
XLM $0.1165
ENS $22.8347
NEAR $3.7109
APEX $2.4753
WEMIX $2.0914
MKR $2051.3393
RETH $3421.4719
ALGO $0.2075
BTC $51740.4000
ETH $3112.6552
BNB $388.4861
SOL $103.4699
XRP $0.5425
ADA $0.5914
AVAX $37.4726
TRX $0.1377
DOGE $0.0861
wstETH $3608.1939
LINK $18.7122
DOT $7.9253
WETH $3099.5051
UNI $11.0991
MATIC $0.9984
WBTC $51892.2111
IMX $3.2035
ICP $12.4694
LTC $70.1056
BCH $267.9077
CAKE $3.1362
FIL $8.1161
ETC $27.2027
KAS $0.1709
RNDR $7.2125
DAI $1.0003
HBAR $0.1094
ATOM $10.3766
INJ $35.7526
TON $2.0791
OKB $50.2401
VET $0.0451
FDUSD $1.0003
LDO $3.3874
GRT $0.2891
ARB $1.9019
STX $2.5976
XMR $129.3498
TIA $16.7710
XLM $0.1165
ENS $22.8347
NEAR $3.7109
APEX $2.4753
WEMIX $2.0914
MKR $2051.3393
RETH $3421.4719
ALGO $0.2075
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Akamai researchers accidentally disabled KmsdBot botnet


    The incident occurred during testing of a botnet built on the KmsdBot malware. While exploring the possibilities of the botnet, Akamai researchers accidentally sent a command with a syntax error to the bots, which led to the shutdown of the botnet.

    The botnet was reported by Akamai Security Research in the middle of last month. It is based on KmsdBot, a malware written in the Go language that uses SSH to infiltrate victims' systems. After gaining a foothold in the victim's system, the malware connects the user to the botnet and uses their device to mine the Monero cryptocurrency and carry out DDoS attacks. Among the main targets of KmsdBot were game companies, information security firms, and even luxury car manufacturers.

    But why did the botnet manage to be disabled with one command? According to Akamai researchers, there are only two reasons:

    • The lack of a mechanism for fixing in the infected system. This means that the victim's system will have to be infected first if it has been deleted or has lost contact with the C&C server for some reason.
    • The absence of a mechanism that checks commands for errors. In the case of Akamai, the failure of the entire botnet was caused by the execution of an attacking command in which there was a syntax error - a space was missing between the address of the target site and the port.

    The botnet had no mechanism to gain a foothold in the victim's system. And since all the bots have lost contact with the C&C server, the operators will have to re-infect the victims and set up a botnet.

    Author DeepWeb
    Shadow archivists are concerned about the active hunt for online libraries
    Crypto robbers from North Korea again replenish the country's budget by stealing cryptocurrency

    Comments 0

    Add comment