Every day, a rapidly expanding botnet ensnares routers, DVRs, and servers across the Internet to target more than 100 victims in distributed denial-of-service (DDoS) attacks.
Between March 29 and April 10, this newly found malware, dubbed Fodcha by researchers at Qihoo 360's Network Security Research Lab (360 Netlab), infected almost 62,000 computers.
The number of unique IP addresses associated with the botnet fluctuates as well, with 360 Netlab reporting that they are tracking a 10,000-strong Fodcha army of bots using Chinese IP addresses every day, with the majority of them using the services of China Unicom (59.9 per cent) and China Telecom (59.9 per cent) (39.4 per cent).
"Based on firsthand data from the security community with which we collaborated, the number of daily live bots exceeds 56000," Netlab claimed.
"The global infection appears to be very large, with more than 10,000 daily active bots (IPs) and more than 100 DDoS victims being attacked on a daily basis solely in China."
Exploits and brute-force attacks are used to spread the virus
- Android: Android ADB Debug Server RCE
- GitLab: CVE-2021-22205
- Realtek Jungle SDK: CVE-2021-35394
- MVPower DVR: JAWS Webserver unauthenticated shell command execution
- LILIN DVR: LILIN DVR RCE
- TOTOLINK Routers: TOTOLINK Routers Backdoor
- ZHONE Router: ZHONE Router Web RCE
Please do not enter any spam link in the comment box.