Akamai Technologies has published a threat advisory to warn organizations of attacks where cybercriminals are infecting Linux servers with malware capable of launching powerful distributed denial-of-service (DDoS) attacks.
According to the alert released Wednesday, attacks leveraging Linux malware dubbed IptabLes and IptabLex have been launched against the entertainment industry and other verticals. The threats are designed to target Linux distributions such as Debian, CentOS, Ubuntu and Red Hat, and have been placed on servers by exploiting vulnerabilities in Apache Struts, Apache Tomcat, the open source search and analytics engine Elasticsearch, and other software components.
According to the alert, attackers are leveraging flaws in these programs to breach servers and escalate their privileges, which enables them to drop and execute the malicious binary. Administrators can detect infections by looking for files named “.IptabLes” or “.IptabLex” in the “/boot” directory. However, Akamai points out that these are post-infection indicators since these are not the names of the malicious files at the moment when they’re dropped.
Cybercriminals can send commands to infected machines for launching SYN and DNS flood attacks, the report said. One of the campaigns observed by Akamai peaked at 119 Gbps bandwidth and 110 Mpps in volume.
“We have traced one of the most significant DDoS attack campaigns of 2014 to infection by IptabLes and IptabLex malware on Linux systems,” explained Stuart Scholly, senior vice president and general manager at Akamai’s Security Business Unit. “This is a significant cybersecurity development because the Linux operating system has not typically been used in DDoS botnets. Malicious actors have taken advantage of known vulnerabilities in unpatched Linux software to launch DDoS attacks. Linux admins need to know about this threat to take action to protect their servers.”
IptabLes and IptabLex malware infections were first spotted in January 2014 and were first analyzed by the research group Malware Must Die in June. Malware Must Die reported at the time that the command and control (C&C) servers used by these threats are located in China, a fact confirmed by Akamai in its advisory.
While initially most infections were confined to Asia, Akamai has recently spotted compromised servers in the United States and other countries as well.
An analysis on similar Linux DDoS bots was published by Kaspersky Lab in July. The security firm later found that some variants of the malware had been planted on Amazon EC2 servers by exploiting vulnerabilities in Elasticsearch.
Akamai’s threat advisory (PDF) from the company’s Prolexic Security Engineering & Research Team (PLXsert), which includes indicators of infection and mitigation recommendations, is available online.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
- TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
