CatDDoS Botnet Exploits Over 80 Vulnerabilities in Major Software and Devices
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
Origin and Spread of CatDDoS
First observed in the wild in August 2023, CatDDoS is a Mirai botnet variant that can perform DDoS attacks using various methods, such as UDP and TCP. The botnet derives its name from cat-related references found in the malware’s source code and command-and-control (C2) domain names. Most of the attack targets are located in China, followed by the U.S., Japan, Singapore, France, Canada, the U.K., Bulgaria, Germany, the Netherlands, and India.
Technical Specifics and Variants
CatDDoS uses the ChaCha20 algorithm to encrypt communications with its C2 server and employs an OpenNIC domain to evade detection, similar to the Fodcha botnet.
It shares the same key/nonce pair for the ChaCha20 algorithm with other DDoS botnets like hailBot, VapeBot, and Woodman. Although the original authors of CatDDoS shut down their operations in December 2023, the source code was sold or leaked, leading to new variants such as RebirthLTD, Komaru, and Cecilio Network.
Trending: OSINT Tool: SiteDorks
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: thehackernews.com