Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

Cisco, Level 3 Disrupt SSH Brute Force Attacks Used to Deliver DDoS Bot

Cisco’s Talos research group and Level 3 Communications have joined forces in an effort to disrupt the activities of a malicious actor that has been using Secure Shell (SSH) brute force attacks to distribute a sophisticated Linux DDoS bot.

Cisco’s Talos research group and Level 3 Communications have joined forces in an effort to disrupt the activities of a malicious actor that has been using Secure Shell (SSH) brute force attacks to distribute a sophisticated Linux DDoS bot.

The activities of this group, dubbed “SSHPsychos,” were first documented by the MalwareMustDie research group last year. In February, FireEye also published a report on the threat actor’s operations.

The attackers use a list of more than 300,000 unique passwords in an effort to guess root passwords. Cisco noticed in the first quarter of 2015 that the number of SSH authentication attempts from the netblock used by the group was larger than the number of attempts from all other hosts combined. In fact, at times, the attackers’ activities accounted for more than a third of the total Internet SSH traffic, Cisco said.

Once the SSH login is successful, the malicious actor, which is believed to have Chinese roots, downloads the XOR.DDoS malware onto the victim’s system. Researchers previously noted that XOR.DDoS is different from other DDoS bots because it’s written in C/C++ and it uses a rootkit component for persistence.

The malware can launch DDoS attacks against a list of targets provided by the command and control (C&C) server, and it can also download and execute other files.

After seeing that the reports published by the IT security community have not discouraged the malicious actor, Cisco and Level 3 decided to take action and try to remove he threat from the Internet. First, experts learned everything they could on the malware, and assessed the scale of the campaign and its impact. Then, the companies removed the routing capabilities for the netblocks used by the cybercriminals and urged other network operators to do the same. By blackholing attack traffic inside its global network, Level 3 has limited the threat group’s ability to compromise systems and deliver malware.

This operation doesn’t completely disrupt the activities of the SSHPsychos group, but at least it slows them down, experts noted.

At one point, SSHPsychos moved their scanning operation from 103.41.124.0/23 to 43.255.190.0/23, and changed multiple malware and C&C server IP addresses. It’s likely that they will make further changes in an effort to resurrect their DDoS capabilities.

Advertisement. Scroll to continue reading.

“While these changes protect the portions of the Internet overseen by Level 3, we believe there is still more to be done. We ask that others join us to stop malicious traffic from spreading on the internet,” Cisco researchers wrote in a blog post. “We encourage ISPs and network administrators to join our efforts to curb this specific group, by removing the routes for these networks in a controlled and responsible manner. If we work together, we have the opportunity to eliminate a group that is making no effort to hide their malicious activity.”

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.