Ddostf: MySQL Servers Turned DDoS Battlegrounds

by | Nov 17, 2023 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A malware botnet named Ddostf is on the rampage, specifically targeting MySQL servers to harness them as part of a DDoS-as-a-Service platform available for rent by cybercriminals.

Unearthed by researchers at the AhnLab Security Emergency Response Center (ASEC), this campaign exposes the dark underbelly of cyber threats that exploit vulnerabilities in MySQL environments or exploit weak administrator credentials through brute force attacks.

Ddostf’s operators are strategically scanning the internet for susceptible MySQL servers, using a dual approach of exploiting vulnerabilities in unpatched systems and aggressively attempting to crack weak administrator account passwords. For Windows-based MySQL servers, the threat actors employ a technique known as User-Defined Functions (UDFs) to execute commands on the compromised systems.

Metasploit module for abusing UDFMetasploit module for abusing UDF (ASEC)

See Also: So you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

User-Defined Functions (UDFs) are a MySQL feature allowing users to define functions in C or C++ and compile them into a DLL (Dynamic Link Library) file, extending the capabilities of the database server. In this attack, the adversaries create their own malicious UDFs, registering them as a DLL file (amd.dll), enabling functions such as downloading payloads, executing system-level commands, and sending results of command execution back to the attackers.

This abuse of UDFs not only facilitates the deployment of the primary payload, the Ddostf bot client, but also opens the door for potential installation of other malware, data exfiltration, and the creation of backdoors for persistent access.

Ddostf Origins

Ddostf, a Chinese-origin malware botnet that has been active for approximately seven years, is not limited to a specific operating system, targeting both Linux and Windows systems. On Windows, it establishes persistence by registering itself as a system service, decrypting its command and control (C2) configuration to establish a connection.

Ddostf's system serviceDdostf’s system service (ASEC)




Unique to Ddostf is its ability to connect to a new C2 address, providing resilience against takedowns. The malware profiles host systems, collecting data such as CPU frequency, language information, Windows version, and network speed, sending this information to its C2 server. The server may then command the botnet client to launch various DDoS attacks, including SYN Flood, UDP Flood, and HTTP GET/POST Flood.

To guard against such attacks, cybersecurity experts recommend MySQL administrators apply the latest updates promptly and enforce robust password policies to protect against brute force and dictionary attacks on admin accounts.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This