Malware & RansomwareHIGH

Masjesu DDoS Botnet Targets IoT Devices with Evasive Tactics

Featured image for Masjesu DDoS Botnet Targets IoT Devices with Evasive Tactics
#Masjesu#DDoS#IoT#botnet#Trellix

Original Reporting

SWSecurityWeek·Ionut Arghire

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NameMasjesu
Malware TypeDDoS Botnet
Threat ActorUnknown
Target PlatformIoT Devices
Delivery MethodExploitation of vulnerabilities
Persistence MechanismRenaming executable and creating cron jobs
C2 InfrastructureMultiple C&C domains
CapabilitiesLaunch various types of DDoS attacks
IOCs Available
Detection Rate
MITRE ATT&CK
🎯

Basically, a new botnet called Masjesu is attacking smart devices to launch powerful online attacks.

Quick Summary

The Masjesu botnet is targeting IoT devices for DDoS attacks. With its evasive tactics, it avoids critical infrastructure and blacklisted IPs. Understanding its operation is crucial for defense.

What Happened

The Masjesu botnet has emerged as a significant player in the realm of distributed denial-of-service (DDoS) attacks, primarily targeting Internet of Things (IoT) devices. According to Trellix, this botnet has been operational since at least 2023 and is advertised on platforms like Telegram, boasting capabilities to execute DDoS attacks reaching hundreds of gigabits per second.

Who's Being Targeted

Masjesu predominantly infects IoT devices, with a notable concentration of infections in Vietnam, but it also extends its reach to countries like Brazil, India, Iran, Kenya, and Ukraine. Its operator seems to cater to both Chinese and English-speaking users, indicating a broad target demographic.

How It Works

Masjesu spreads through vulnerabilities in various devices, including:

  • D-Link routers
  • GPON routers
  • Huawei home gateways
  • MVPower DVRs
  • Netgear routers
  • UPnP services

Once it infects a device, Masjesu establishes a remote access point by binding a socket to a hardcoded TCP port. It employs sophisticated persistence techniques, such as renaming its executable to mimic legitimate system processes and creating cron jobs to ensure it runs continuously. This enables it to evade detection and maintain control over the infected devices.

Signs of Infection

Indicators that a device may be infected with Masjesu include:

  • Unexplained slowdowns in device performance
  • Unusual network traffic patterns
  • Presence of unknown processes mimicking system files

How to Protect Yourself

To defend against the Masjesu botnet, users should:

  • Regularly update device firmware to patch vulnerabilities.
  • Disable unnecessary services, such as UPnP, on routers and IoT devices.
  • Monitor network traffic for unusual activity.
  • Employ network security tools to detect and block malicious traffic.

Conclusion

The Masjesu botnet exemplifies the evolving landscape of cyber threats, particularly in the IoT sector. Its evasive tactics and focus on persistence make it a formidable adversary. Awareness and proactive measures are essential to mitigate the risks posed by such sophisticated malware.

🔍 How to Check If You're Affected

  1. 1.Check for unusual processes running on IoT devices.
  2. 2.Monitor network traffic for spikes or unusual patterns.
  3. 3.Ensure firmware is updated to the latest version.

🏢 Impacted Sectors

TechnologyRetail

Pro Insight

🔒 Pro insight: Masjesu's ability to evade detection and target diverse IoT devices highlights the ongoing vulnerabilities within the IoT ecosystem.

Sources

Original Report

SWSecurityWeek· Ionut Arghire
Read Original

Related Pings

HIGHMalware & Ransomware

Automated Magic Packet Generation - Enhancing Malware Analysis

A new tool automates the creation of packets that trigger BPF malware, drastically cutting analysis time. This impacts sectors like telecommunications and government. Swift action is needed to combat these stealthy threats.

Cloudflare Blog·
HIGHMalware & Ransomware

Dutch Healthcare Software Vendor - Ransomware Attack Disrupts Services

A ransomware attack has taken down Dutch healthcare vendor ChipSoft, disrupting services for hospitals nationwide. This incident highlights ongoing cyber threats in the healthcare sector, raising concerns about patient data security.

The Register Security·
HIGHMalware & Ransomware

Lua-Based Malware LucidRook Targets Taiwanese NGOs

Cisco Talos has uncovered LucidRook, a new Lua-based malware targeting Taiwanese NGOs. This sophisticated malware uses spear-phishing tactics to infiltrate organizations. Vigilance is crucial as it employs advanced evasion techniques.

Cisco Talos Intelligence·
HIGHMalware & Ransomware

Malicious Chrome Extension - Injects Malware in Browsers

A new malicious Chrome extension, Amazing Refresh, is hijacking user clicks and monetizing traffic without consent. This poses risks to both users and website owners. Immediate action is needed to remove the extension and protect users.

Scott Helme·
HIGHMalware & Ransomware

NightSpire Ransomware - Analyzing Evolving IOCs and TTPs

A recent NightSpire ransomware incident shows how evolving tactics complicate detection and recovery. Organizations must adapt to these changes to protect their data.

Huntress Blog·
HIGHMalware & Ransomware

Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled

Storm-1175 has been identified as a rapidly executing ransomware group that exploits newly disclosed vulnerabilities to deploy Medusa ransomware within 24 hours. Their tactics pose significant risks to various sectors, especially healthcare and finance.

Microsoft Security Blog·