InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Experts discover new Xordos controllers, infrastructure as malware expands to Docker, Linux and IoT
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Experts discover new Xordos controllers, infrastructure as malware expands to Docker, Linux and IoT
Technology

Experts discover new Xordos controllers, infrastructure as malware expands to Docker, Linux and IoT

April 18, 2025 3 Min Read
Share
New XorDDoS Controller, Infrastructure
SHARE

Cybersecurity researchers have warned of the ongoing risk posed by the distributed denial of service (DDOS) malware known as Xorddos, with 71.3% of attacks targeting the US between November 2023 and February 2025.

“The prevalence of Xorddos Trojan has increased significantly from 2020 to 2023,” Cisco Talos researcher Joey Chen said in an analysis Thursday.

“This trend is due to the increased malicious DNS requests linked to command and control (C2) infrastructure, as well as the widespread global distribution of Xordos Trojans. In addition to targeting exposed Linux machines, Trojans have expanded their reach to Docker servers and converted infected hosts into bots.

Almost 42% of compromised devices are in the US, followed by Japan, Canada, Denmark, Italy, Morocco and China.

Xorddos is a well-known malware with a proven track record of Striking Linux systems for over 10 years. In May 2022, Microsoft reported a significant surge in Xorddos activity, and infectious diseases paved the way for cryptocurrency mining malware, such as tsunamis.

The main initial access route involves carrying out a secure shell (SSH) brute force attack, obtaining valid SSH credentials, and downloading and installing malware on vulnerable IoT and other internet-connected devices.

Once the scaffolding is successfully established, the malware uses built-in initialization scripts and Cron jobs to set up persistence, allowing it to start automatically on system startup. It also uses the XOR key “BB2FA36AAA9541F0” to decrypt the configuration that exists within itself to extract the IP address required for C2 communication.

Talos has observed a new version of the Xorddos subcontroller, known as the VIP version in 2024, along with its corresponding central controller and builder, indicating that the product is likely to be advertised for sale.

See also  A new research paper questions the price of "tokens" in AI chat

The central controller is responsible for managing multiple XordDOS subcontrollers and sending DDOS commands simultaneously. Each of these sub-controllers commands a botnet of infected devices.

“The language settings for multi-layer controllers, Xorddos builders, and controller combined tools strongly suggest that the operator is a Chinese-speaking individual,” Chen said.

Share This Article
Twitter Copy Link
Previous Article In the final Epoch Season 2, we'll see the number of RPG players soaring up the path of exile 2 In the final Epoch Season 2, we’ll see the number of RPG players soaring up the path of exile 2
Next Article mm How AI is redrawing the world’s electrical maps: insights from IEA reports

Latest News

mm

Why LLMS is thinking too much about simple puzzles, but give up on hard puzzles

Artificial intelligence has made incredible advances with large-scale language models…

June 15, 2025
JSFireTruck JavaScript Malware

Over 269,000 websites infected with JSFiretruck JavaScript malware

Cybersecurity researchers are paying attention to "large campaigns" that undermine…

June 15, 2025
You need to know what features you need with 6 new ChatGPT projects

You need to know what features you need with 6 new ChatGPT projects

The ChatGPT project has just received the most significant update…

June 14, 2025
AsyncRAT and Skuld Stealer

Discord Invite Link Hijacking offers Asyncrat and Skuld Stealer targeted at crypto wallets

The new malware campaign is taking advantage of the weaknesses…

June 14, 2025
mm

The future of advertising after AI traffic coup

Large-scale language models are steadily replacing traditional searches by not…

June 13, 2025

You Might Also Like

When Veo3 enters the photo, Hollywood can be seen over his shoulder
Technology

When Veo3 enters the photo, Hollywood can be seen over his shoulder

13 Min Read
mm
Technology

Self-recognized images with simple JPEG compression

12 Min Read
mm
Technology

AI Feedback Loop: When machines amplify their own mistakes by trusting each other’s lies

10 Min Read
Winos 4.0 Malware
Technology

Hackers deliver Winos 4.0 malware using fake VPN and browser NSIS installer

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?