Global Information Lookup Global Information

BASHLITE information


BASHLITE
Technical nameAs BashLite
  • ELF/Gafgyt.[letter]!tr (Fortinet)
  • Backdoor.Linux.BASHLITE.[letter] (Trend Micro)

As Gafgyt

  • ELF/Gafgyt.[letter]!tr (Fortinet)
  • HEUR:Backdoor.Linux.Gafgyt.[letter] (Kaspersky)
  • DDoS:Linux/Gafgyt.YA!MTB (Microsoft)
  • ELF_GAFGYT.[letter] (Trend Micro)

As QBot

  • Trojan-PSW.Win32.Qbot (Kaspersky)
  • Backdoor.Qbot (Malwarebytes)
  • Win32/Qakbot (Microsoft)
  • Bck/QBot (Panda)
  • Mal/Qbot-[letter] (Sophos)
  • W32.Qakbot (Symantec)
  • BKDR_QAKBOT (Trend Micro)
  • TROJ_QAKBOT (Trend Micro)
  • TSPY_QAKBOT (Trend Micro)
  • WORM_QAKBOT (Trend Micro)
  • Backdoor.Qakbot (VirusBuster)

As PinkSlip

  • W32/Pinkslipbot (McAfee)
As Torlus
AliasesGafgyt, Lizkebab, PinkSlip, Qbot, Torlus, LizardStresser
TypeBotnet
Author(s)Lizard Squad
Operating system(s) affectedLinux
Written inC

BASHLITE (also known as Gafgyt, Lizkebab, PinkSlip, Qbot, Torlus and LizardStresser) is malware which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS).[1] Originally it was also known under the name Bashdoor,[2] but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.[3]

The original version in 2014 exploited a flaw in the bash shell - the Shellshock software bug - to exploit devices running BusyBox.[4][5][6][7] A few months later a variant was detected that could also infect other vulnerable devices in the local network.[8] In 2015 its source code was leaked, causing a proliferation of different variants,[9] and by 2016 it was reported that one million devices have been infected.[10][11][12][13]

Of the identifiable devices participating in these botnets in August 2016 almost 96 percent were IoT devices (of which 95 percent were cameras and DVRs), roughly 4 percent were home routers - and less than 1 percent were compromised Linux servers.[9]

  1. ^ Cimpanu, Catalin (30 August 2016). "There's a 120,000-Strong IoT DDoS Botnet Lurking Around". Softpedia. Retrieved 19 October 2016.
  2. ^ Tung, Liam (25 September 2014). "First attacks using shellshock Bash bug discovered". ZDNet. Retrieved 25 September 2014.
  3. ^ Ashford, Warwick (30 June 2016). "LizardStresser IoT botnet launches 400Gbps DDoS attack". Computer Weekly. Retrieved 21 October 2016.
  4. ^ Kovacs, Eduard (14 November 2014). "BASHLITE Malware Uses ShellShock to Hijack Devices Running BusyBox". SecurityWeek.com. Retrieved 21 October 2016.
  5. ^ Khandelwal, Swati (November 17, 2014). "BASHLITE Malware leverages ShellShock Bug to Hijack Devices Running BusyBox". The Hacker News. Retrieved 21 October 2016.
  6. ^ Paganini, Pierluigi (16 November 2014). "A new BASHLITE variant infects devices running BusyBox". Security Affairs. Retrieved 21 October 2016.
  7. ^ "Bash Vulnerability (Shellshock) Exploit Emerges in the Wild, Leads to BASHLITE Malware". Trend Micro. 25 September 2014. Retrieved 19 March 2017.
  8. ^ Inocencio, Rhena (13 November 2014). "BASHLITE Affects Devices Running on BusyBox". Trend Micro. Retrieved 21 October 2016.
  9. ^ a b "Attack of Things!". Level 3 Threat Research Labs. 25 August 2016. Archived from the original on 3 October 2016. Retrieved 6 November 2016.
  10. ^ "BASHLITE malware turning millions of Linux Based IoT Devices into DDoS botnet". Full Circle. 4 September 2016. Archived from the original on 22 October 2016. Retrieved 21 October 2016.
  11. ^ Masters, Greg (31 August 2016). "Millions of IoT devices enlisted into DDoS bots with Bashlite malware". SC Magazine. Retrieved 21 October 2016.
  12. ^ Spring, Tom (30 August 2016). "BASHLITE Family of Malware Infects 1 Million IoT Devices". Threatpost.com. Retrieved 21 October 2016.
  13. ^ Kovacs, Eduard (31 August 2016). "BASHLITE Botnets Ensnare 1 Million IoT Devices". Security Week. Retrieved 21 October 2016.

and 9 Related for: BASHLITE information

Request time (Page generated in 0.5184 seconds.)

BASHLITE

Last Update:

BASHLITE (also known as Gafgyt, Lizkebab, PinkSlip, Qbot, Torlus and LizardStresser) is malware which infects Linux systems in order to launch distributed...

Word Count : 658

Dahua Technology

Last Update:

cameras and DVRs. Nearly one million Dahua devices were infected with the BASHLITE malware. A vulnerability in most of Dahua's cameras allowed "anyone to...

Word Count : 3798

Timeline of computer viruses and worms

Last Update:

Kingdom as a tool for espionage and mass surveillance.[citation needed] The BASHLITE malware is leaked leading to a massive spike in DDoS attacks. Linux.Wifatch...

Word Count : 7684

Xor DDoS

Last Update:

targets, which tend to be located in Asia. Application layer DDoS attack BASHLITE Botnet Dendroid (Malware) Denial-of-service attack Rootkit Zombie (computer...

Word Count : 372

Botnet

Last Update:

devices. The method was tested by infecting nine IoT devices with Mirai and BASHLITE botnets, showing its ability to accurately and promptly detect attacks...

Word Count : 4888

MalwareMustDie

Last Update:

NyaDrop NewAidra or IRCTelnet Torlus aka Gafgyt/Lizkebab/Bashdoor/Qbot/BASHLITE) LightAidra PNScan STD Bot Kaiten botnets (Linux DDoS or malicious proxy...

Word Count : 1718

Carna botnet

Last Update:

observed from May to October 2012. The top 20 Top Level Domains were: BASHLITE Mirai (malware) Remaiten Linux.Darlloz Linux.Wifatch Hajime (malware) Stöcker...

Word Count : 572

Linux malware

Last Update:

telnet service and designed to infect Internet of Things (IoT). GafGyt/BASHLITE/Qbot – a DDoS botnet spreads through SSH and Telnet service weak passwords...

Word Count : 4794

Remaiten

Last Update:

remove competing bots on a system compromised by it. Botnet Mirai (malware) BASHLITE Linux.Darlloz Linux.Wifatch Hajime (malware) "New Remaiten Malware Builds...

Word Count : 299

PDF Search Engine © AllGlobal.net