Uncovering the Gorilla Botnet: A Rising Threat to Global Cybersecurity

Uncovering the Gorilla Botnet: A Rising Threat to Global Cybersecurity

A newly discovered botnet malware family, known as Gorilla (or GorillaBot), has been wreaking havoc on global cybersecurity. This variant of the leaked Mirai botnet source code has launched over 300,000 DDoS attacks across 100 countries, with China, the U.S., Canada, and Germany being the most targeted.

Gorilla Botnet: Capabilities and Tactics

The Gorilla Botnet employs various tactics to conduct devastating DDoS attacks. Its primary methods include UDP flood, ACK BYPASS flood, Valve Source Engine (VSE) flood, SYN flood, and ACK flood. The botnet’s connectionless nature allows for arbitrary source IP spoofing, generating large amounts of traffic.

Technical Sophistication

Gorilla Botnet supports multiple CPU architectures, including ARM, MIPS, x86_64, and x86. It connects with one of five predefined command-and-control (C2) servers to await DDoS commands. Notably, the botnet exploits a security flaw in Apache Hadoop YARN RPC for remote code execution, a vulnerability that has been abused in the wild since 2021.

Persistence and Evasion

To maintain persistence, Gorilla Botnet creates a service file named “custom.service” in the “/etc/systemd/system/” directory, configuring it to run automatically at system startup. Similar commands are added to “/etc/inittab,” “/etc/profile,” and “/boot/bootcmd” files to download and run a shell script (“lol.sh”) from a remote server.

Global Impact

Between September 4 and September 27, 2024, Gorilla Botnet issued an average of 20,000 commands daily, targeting universities, government websites, telecoms, banks, gaming, and gambling sectors. This alarming rate highlights the urgent need for cybersecurity professionals to stay vigilant.

Mitigation Strategies

To combat Gorilla Botnet, organizations must prioritize:

1. Real-time threat intelligence

2. Advanced DDoS protection

3. Regular security updates and patches

4. Network segmentation and isolation

5. Continuous monitoring and incident response

The emergence of Gorilla Botnet underscores the evolving nature of cybersecurity threats. Staying informed and proactive is crucial in protecting against these sophisticated attacks.

Read more at: https://thehackernews.com/2024/10/new-gorilla-botnet-launches-over-300000.html?m=1

Post Comment