Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
According to researchers, a Golang-based botnet named GoBruteforcer has been discovered, which is specifically targeting web servers running FTP, MySQL, phpMyAdmin, and Postgres services. This botnet is designed to carry out brute-force attacks, which involve trying out multiple username and password combinations until it finds the correct one to gain unauthorized access to a target system.
Golang, also known as Go, is a programming language that has gained popularity in recent years due to its simplicity and efficiency. Unfortunately, cybercriminals have also been adopting Golang to create new and sophisticated malware.
Botnets are networks of compromised devices, which are controlled by a single attacker or group of attackers. Botnets can be used for a variety of malicious purposes, including DDoS attacks, spam campaigns, and credential stuffing attacks, which is likely the goal of the GoBruteforcer botnet.
“Malware like GoBruteforcer takes advantage of weak (or default) passwords” mentioned in their blog. Credential stuffing attacks involve using stolen or leaked usernames and passwords to gain unauthorized access to accounts. By targeting web servers running FTP, MySQL, phpMyAdmin, and Postgres services, the GoBruteforcer botnet is likely attempting to gain access to sensitive data stored on those servers, including customer information, financial data, and intellectual property.
The GoBruteforcer botnet targets all IP addresses within a chosen Classless Inter-Domain Routing (CIDR) block, which is a range of IP addresses. The botnet then uses a multiscan module to scan for hosts inside the CIDR block. Once identified, the botnet launches brute force attacks to try and gain unauthorized access to these servers. The botnet targets x86, x64, and ARM processor architectures, and experts discovered that it communicates with the attacker’s server via an internet relay chat (IRC) bot on the victim server.
“Once a host is found, GoBruteforcer tries to get access to the server via brute force. After achieving access, GoBruteforcer deploys an IRC bot containing the attacker’s URL. Later, GoBruteforcer also tries to query the victim system using a PHP web shell.”
They reported, the botnet scans for any open port 80 to target phpMyAdmin services, and for MySQL and Postgres services, the malware scans for open ports 3306 and 5432 and pings the host’s database with a certain username and password.
When targeting FTP services, the malware checks for open port 21 and attempts to authenticate using the Goftp library, which is an FTP client package for Golang. This approach is known as a brute-force attack, where the botnet tries out multiple combinations of usernames and passwords until it finds the correct one to gain unauthorized access to the server.
“The GoBruteforcer bot comes with a multiscan capability, which gives it a wide range of targets that it can use to get into a network. GoBruteforcer also seems to be in active development, so attackers could change the techniques they use to target web servers in the near future”, they conclude.
Overall, the impact of GoBruteforcer highlights the importance of implementing strong password policies, regularly updating software, and utilizing security measures such as multi-factor authentication to protect web servers from brute-force attacks and other types of cyber threats.