4.2 Million Hosts, Including VPNs and Routers, Exposed by Unsecured Tunneling Protocols
January 21, 20254.2 Million Hosts, Including VPNs and Routers, Exposed by Unsecured Tunneling Protocols
January 21, 2025Severity
Meduim
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
bb79b3a1d35eb93ca7666a4dd8b09faa
c5dfc37457dbc81c4c367efc3eb359c6
47251c024e627999fc355cb16de2c9ff
SHA-256
2465009c7a47dde070ab7f8f4a9c53a8afa6b8ec4b1414c28bfd9a6f3b9d98bc
4579193e24a217bbc3895569bfacc39da3bdd8ba7e96c93cc82bc1d3de5f5209
3a88598c06ed2d49652942ca2236ef3779e01d3bf7d9806c6d45f64d1caa5170
SHA-1
0164c80e23786239ba6fd8bac0ae4319cc391767
b32c47f92a89af89fcd64b0a871582665352c9f4
55644fc57ec194c6d91bafca5e71dbb6af10872c
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.