New Trojan Turns Linux Devices into Botnet

New Trojan Turns Linux Devices into Botnet


Linux is considered as one of the most secure operating systems but things seem to be changing as cyber criminals are equipping themselves with the latest tools. That’s why recently, researchers at Doctor Web have discovered a Linux trojan that can turn an infected Linux device and websites into a P2P botnets.
Usually, a malware is designed to infect devices in order to steal financial and personal data but ”Linux.Rex.1” malware has the ability to perform DDoS attacks from the infected device, send malicious messages and distribute itself to others networks.
Once the device is infected, the malware sets it up as a bot and takes instruction from unknown cyber criminals using command and control (C&C) servers. It then distributes itself onto other networks using the same infected device.
Drupal based websites are a special target of this malware since it has the ability to perform vulnerability scan and using SQL injection to hack websites, upon hacking, the malware makes a clone of the site and distributes itself on further networks.

Submitted by: Arnfried Walbrecht


Comments are closed.