New Gorilla Botnet Deploys Over 300,000 DDoS Attacks Worldwide

October 07, 2024Ravie LakshmananInternet of Things Security / Botnet

Reportedly, cybersecurity scholars have unearthed a newly identified botnet virus known as Gorilla (or GorillaBot), which is a mutation of the exposed Mirai botnet source code.

New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries

October 07, 2024Ravie LakshmananInternet of Things Security / Botnet

New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries

Reportedly, cybersecurity scholars have unearthed a newly identified botnet virus known as Gorilla (or GorillaBot), which is a mutation of the exposed Mirai botnet source code.

A definitive report by cybersecurity enterprise NSFOCUS outlined that this botnet “dispatched in excess of 300,000 assault directives, showing alarming density” from September 4 to September 27, 2024. An approximate of 20,000 assault directives were orchestrated daily to initiate distributed denial-of-service (DDoS) attacks.

Cybersecurity

As per the analysis, the botnet targeted beyond 100 countries, launching assaults on educational institutions, governmental portals, telecommunications, banking institutions, as well as the gaming and betting sectors. Notably, China, the United States, Canada, and Germany were prominently victimized.

The firm based in Beijing noted that Gorilla predominantly relies on UDP flood, ACK BYPASS flood, Valve Source Engine (VSE) flood, SYN flood, and ACK flood methodologies for executing DDoS operations. Furthermore, the botnet leverages the connectionless attributes of the UDP protocol to generate substantial traffic through arbitrary source IP spoofing.

In addition to supporting diverse CPU structures like ARM, MIPS, x86_64, and x86, this botnet possesses the capacity to connect to one of five preconfigured command-and-control (C2) servers to await DDoS directives.

Interestingly, the malicious software integrates functionalities to exploit a security loophole present in Apache Hadoop YARN RPC for executing remote code. It is important to note that this vulnerability has been exploited in real-world scenarios as early as 2021, as reported by Alibaba Cloud and Trend Micro.

Establishing persistence on the host involves creating a service file named custom.service within the “/etc/systemd/system/” directory and configuring it to initiate automatically on every system boot-up.

Cybersecurity

This service is responsible for downloading and executing a shell script (“lol.sh”) from a remote server (“pen.gorillafirewall[.]su”). Similar directives are also inserted into “/etc/inittab,” “/etc/profile,” and “/boot/bootcmd” files to download and activate the shell script upon system boot or user login.

“The botnet introduced multiple DDoS methodologies and utilized encryption algorithms commonly linked with the Keksec group to obscure vital details, along with deploying multiple strategies to maintain sustained control over IoT devices and cloud servers, showcasing a high level of evasion towards detection as an evolving botnet lineage,” stated NSFOCUS.

Enjoyed this write-up? Follow us on Twitter and LinkedIn for more exclusive reads.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.