"New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks"

HinataBot, a new GoLang-based botnet, has been found exploiting known vulnerabilities to compromise routers and servers and use them to launch Distributed Denial-of-Service (DDoS) attacks. Akamai stated that the malware binaries appear to have been named after a character from the popular anime series Naruto, with file name structures such as 'Hinata-OS>-Architecture>.' The exploitation of exposed Hadoop YARN servers and security flaws in Realtek SDK devices and Huawei HG533 routers are among the tactics used to spread the malware. Unpatched vulnerabilities and weak credentials have been low-hanging fruit, as they are an easy, well-documented entry point that does not require sophisticated social engineering techniques. The threat actors behind HinataBot have been active since at least December 2022, with the attacks initially using a generic Go-based Mirai variant before moving to their own custom malware on January 11, 2023. This article continues to discuss the new HinataBot botnet. 

THN reports "New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks"

Submitted by Anonymous on