Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
An updated version of a malware botnet named KmsdBot is now focusing on attacking Internet of Things (IoT) devices, demonstrating an expansion in its capabilities and potential targets. This new version of KmsdBot includes additional features, such as support for Telnet scanning and compatibility with more CPU architectures. This information was revealed by Akamai security researcher Larry W. Cashdollar in an analysis released recently.
The revised KmsdBot has been active since July 16, 2023. This update comes a few months after it was discovered that the botnet was being offered as a service for distributed denial-of-service (DDoS) attacks, highlighting its continued relevance and effectiveness in real-world cyberattacks.
The origins of KmsdBot can be traced back to November 2022 when it was initially documented by a web infrastructure and security company. Originally designed to target private gaming servers and cloud hosting providers, the malware has since expanded its focus to include targets like Romanian government websites and Spanish educational sites.
The primary method of attack employed by KmsdBot involves scanning random IP addresses for open SSH ports and then using a list of passwords from a server controlled by the threat actor to brute-force its way into the systems. The updated version not only retains this SSH scanning capability but also introduces Telnet scanning. The Telnet scanner functions by generating random IP addresses and attempting to connect to port 23 on those addresses. Unlike a basic connection attempt, the Telnet scanner verifies the presence of data in the receiving buffer.
The attack via Telnet involves downloading a text file named “telnet.txt.” This file contains a list of commonly used weak passwords and their corresponding combinations, primarily targeting IoT devices with unchanged default credentials.
Cashdollar, the researcher, highlights the ongoing relevance of KmsdBot’s activities, emphasizing the continued prevalence and vulnerability of IoT devices on the internet. This makes them appealing targets for creating a network of compromised systems. The addition of Telnet scanning capabilities represents an expansion in the botnet’s attack surface, enabling it to potentially target a broader array of devices. Furthermore, the malware’s evolution, including the incorporation of support for more CPU architectures, poses a persistent and growing threat to the security of internet-connected devices.