Automatically translated.View original post

A new malware to turn a Network device into a DDoS.

A new malware has been found that turns the Network device into a DDoS tool.

Distributed Denial-of-Service System Shooting Usually requires some tools to collect the machine that will be used to shoot the system. Most often, botnet malware is used to convert victims' devices that are not involved around the world into zombies in system shooting, and this news is once again one of the spread of this type of malware.

According to a report by the website, Cyber Security News has mentioned the detection of a Botnet malware outbreak campaign to be used to shoot DDoS. The malware focuses on various network related devices - routers, IoT devices (Internet of Things), and enterprise network management devices (Enterprise). There are three malware spread in this campaign: Botnet malware CondiBot for DDoS embedded on network management devices running on Linux and Monaco malware type scans. Secure Shell to attack the system or SSH Scanner, and finally Monero, a malware for mining the Monero genus of Crypto Miner that will be released by the Monaco malware after it has been successfully embedded on the system. All of these malware was detected in the beginning of March. The first two are new malware that have never been recorded on famous malware detection tools like VirusTotal, ThreatFox, and Hybrid Analysis before.

According to a research team from Eclypsium, a supply chain attack specialist, it can be noted that the malware spread behavior is unlikely to come from state-sponsored hackers, but it is likely from hackers who hope to use the victim's machine resources to dig and profit more from mined coins. These hackers tend to use security vulnerabilities on the victim's machine, especially those that occur during the development of the system or Zero-Day, often in particular. And even more dangerous, the devices that hackers focus on in this campaign are usually those that cannot run normal security monitoring tools, so that both hackers and malware can be embedded in the system for a long time without being detected.

For malware attacks, CondiBot starts with hackers using File Transfer Utility tools such as wget, curl, tftp, and ftpget. Send payload files on a Linux device with a security vulnerability (the source does not specify which vulnerability). After the payload is deactivated on the target system, the malware closes the Reboot Utility tool by changing the permissions of the corresponding files to 000. Then contact the C2 or Command and Control server and register the specified number. Unique Bot Identifier

After registering, the malware will immediately enter the Waiting Loop and receive commands from the C2 server. Once ordered, the malware will send one of the 32 Attack Handlers to act immediately. The malware also has the ability to remove any other Botnet malware that may be on board, as well as to handle a process called / bin / sora so that the malware can take over the machine completely. With such perfect operation, it is very difficult to deal with the malware, in addition to Will have direct access to the machine itself to handle it.

# Trending # Lemon 8 Howtoo # lemon 8 diary # freedomhack # ddos

1 day agoEdited to

... Read moreจากประสบการณ์ส่วนตัวในการทำงานกับระบบเครือข่าย พบว่าอุปกรณ์เน็ตเวิร์กต่าง ๆ เช่น เราเตอร์ หรืออุปกรณ์ IoT มักมีการตั้งค่าความปลอดภัยที่ไม่รัดกุม ทำให้เป็นเป้าหมายของมัลแวร์อย่าง CondiBot ที่สามารถเจาะเข้ามาผ่านช่องโหว่ Zero-Day ได้อย่างง่ายดาย มัลแวร์ CondiBot มีวิธีการโจมตีที่ซับซ้อน เช่น การใช้เครื่องมือส่งไฟล์ เช่น wget, curl เพื่อดาวน์โหลดตัว Payload ลงบนระบบเป้าหมาย และเมื่อฝังตัวสำเร็จแล้วจะปิดการทำงานของเครื่องมือรีบูท ทำให้ยากต่อการขจัด โดยมัลแวร์ยังสามารถติดต่อกับเซิร์ฟเวอร์ควบคุม (C2) เพื่อรอรับคำสั่งโจมตีและลบมัลแวร์ประเภท Botnet ตัวอื่นที่ทำงานพร้อมกัน เพื่อรักษาความเป็นเจ้าของเครื่อง ในฐานะที่ดูแลระบบเครือข่ายร่วมกับทีม ผมแนะนำให้เจ้าของระบบเร่งอัปเดตซอฟต์แวร์และเฟิร์มแวร์ของอุปกรณ์ รวมถึงตั้งค่าการป้องกันที่แข็งแกร่ง เช่น ปิดพอร์ต SSH ที่ไม่จำเป็น หรือใช้การยืนยันตัวตนแบบหลายขั้นตอน กล่าวคือหากอุปกรณ์ใดมีช่องโหว่หรือไม่ได้รับการป้องกันอย่างเหมาะสม ก็จะกลายเป็นเครื่องมือโจมตี DDoS ที่อยู่เบื้องหลังระบบล่มโดยไม่รู้ตัว อีกประเด็นที่สำคัญคือการตรวจสอบระบบด้วยเครื่องมือที่เหมาะสม เนื่องจากมัลแวร์ CondiBot สามารถซ่อนตัวได้ดีและไม่แสดงตัวในเครื่องมือตรวจจับทั่วไป การทำระบบมอนิเตอร์ความผิดปกติของทราฟฟิกเครือข่าย ซึ่งสามารถบ่งชี้พฤติกรรมอ๊อฟไลน์หรือพฤติกรรม Botnet ได้เป็นสิ่งจำเป็น สุดท้าย การให้ความรู้กับผู้ดูแลระบบและผู้ใช้งานเกี่ยวกับอันตรายจากมัลแวร์กลุ่ม Botnet และวิธีการรักษาความปลอดภัยขั้นพื้นฐาน จะช่วยลดความเสี่ยงในการถูกโจมตีและเพิ่มความมั่นคงปลอดภัยให้กับระบบเครือข่ายและองค์กรโดยรวมได้มากขึ้น

Related posts

Places to find a remote job 👩🏻‍💻
Working remote seems like a luxury nowadays with so many companies demanding employees come in for hybrid or back in the office full time. These sites conveniently compile remote jobs for contracting positions and full time position: 🌐 Remote OK: Aggregates remote job opportunities from various
Nikki 👩🏻‍💻

Nikki 👩🏻‍💻

10.7K likes

Remote into a Computer on Another Network
Wondering how to remotely access a computer on another network? In this video, I break it down step by step using AnyViewer. Great for remote support, working from home, or accessing files anywhere. #remotework #remote #pc #network #connection
TechEase

TechEase

6 likes

A young woman with long dark hair, wearing a pink satin shirt, smiles at the camera while sitting at a table. Overlay text reads: 'Tools and sites I use as a cybersecurity student to progress my skills and keep me interested in studying'.
A screenshot of 'The Hacker News' website, displaying various cybersecurity news articles from January 2025, including topics like vulnerabilities, malware, cyber espionage, and AI jailbreak methods. An ad for Zscaler and a banner for CIS Hardened Images are also visible.
A screenshot of the O'Reilly learning platform, showing various books and expert playlists related to AI, engineering, and data. Overlay text highlights the subscription cost ($50/month or $499/year) and its value for accessing books and live events.
Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

103 likes

Remote into a Computer on a Different Network
Need to remote into a computer on a different network? You don't need complex port forwarding or a VPN. In this video, I'll show you how to do it fast using AnyViewer. Simple setup, secure connection, and smooth control. #remote #pc #network #connection
SmoothTechie

SmoothTechie

0 likes

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

547 likes

An illustration featuring a laptop, smartphone, tablet, and printer on a desk, with a potted plant. The image has a teal background and white text that reads "CYBER SECURITY LIFE HACKS AND CHEATCODES."
A comprehensive list of various cybersecurity job roles and career paths, categorized by areas such as Security Code Auditor, Architecture, Networking, Audit, Cloud, Offensive, Operations, Compliance, Education, Privacy, Engineering, Sales, Generalist, Threat, and Governance.
An infographic titled "SECURITY TECHNOLOGIES" illustrating nine cybersecurity concepts: Firewall, IDS, IPS, XDR, EDR, Honeypot, SIEM, DLP, and VPN, each with a cartoon child and a brief description of its function.
This could help you in the long run in cyber
#unfiltered #lemon8challenge As someone who has been in tech for now 5 year and just recently started into cybersecurity 💻 here are some like codes and hack that can help you in school and to also break into tech like myself‼️ #cybersecurity #womenintech #blackwomenintech #Lemon8 #l
Affinity B

Affinity B

232 likes

Day 3 of 31: 31 days to a safer you. Did you know hackers can turn on your webcam without you ever noticing? 🎥👀 it happens when malware sneaks onto your device and gives cybercriminals access to your camera. That means your most private moments could be exposed. ✅ Here’s how to protect yours
Cybersecurity Girl

Cybersecurity Girl

22 likes

Why I switched to taking notes on my iPad
I used to love writing in notebooks, but after switching to my iPad, I can confidently say I’m never going back! Here’s why: ✨ Cuter Notes – Let’s be real…aesthetic notes make studying more enjoyable! I can use custom colors, cute stickers, and different handwriting styles to make my notes visua
Rebecca R.

Rebecca R.

262 likes

Check out this website that helps you when you’re feeling uninspired! I walk you thru the process of downloading the svg file to taking it to cricut design space! Happy crafting. #designinspo #creativeart #cricutprojects #svgfiles #CricutTips
VlunaWorks

VlunaWorks

35 likes

How To Create Wrapping Paper To Sell With Printfy!
Yes you read it right! You can create your own wrapping paper as a side hustle for FREE! Free game y'all! You may be asking how to market. Join crafting Facebook groups, gifting groups, anything with gifts or crafting. Make posts about how you create images and customize gift wr
NoFaceAllBags

NoFaceAllBags

20 likes

😫 Wanting to quit your 9-5?
Becoming a Pinterest Manager might be for you! In less than a year, I went from earning $2K at my 9-5 to over $4K/month with Pinterest management alone. Now, with all the different skills and platforms I lesrned, I make anywhere from $12-15K A MONTH! Back then, I knew I had to do something
Bria | Monetize with AI 🤖

Bria | Monetize with AI 🤖

482 likes

Never plug your phone or computer into usb plugs in hotels or airports here’s why 👇🏼 A USB port doesn’t just deliver power, it can also transfer data. A compromised hotel USB outlet could secretly install malware on your phone or copy your data without you realizing it. Hotels, airports, and o
Cybersecurity Girl

Cybersecurity Girl

147 likes

A pink iMac setup on a white desk, featuring a keyboard, mouse, a green drink, decorative figurines, flowers, and makeup products. The screen displays a landscape painting, and 'lemon8 @peachie.suga' is visible.
A digital slide titled 'Software & System Security' with tips to keep browsers and OS updated, install antivirus, and turn on firewalls. It features a shield icon and 'lemon8 @peachie.suga'.
A digital slide titled 'Email & Messaging Safety' with tips to be suspicious of urgent emails, avoid shady attachments, and watch out for fake notifications. It features an envelope icon and 'lemon8 @peachie.suga'.
how to protect your devices from viruses! Pt 2
‧°𐐪♡𐑂°‧₊ 💌 Your device & inbox deserve protection too 💻📬 Here are small but powerful ways to stay safe online: 🛡️ Software & System Security – always update your OS & browser, turn on your firewall, and scan regularly for threats 📧 Email & Messaging Safety – avoid suspicious lin
peachiesuga ♡

peachiesuga ♡

30 likes

cable for your firestick or android device
stop paying high cable bills
DIRTYWORLDTV

DIRTYWORLDTV

1 like

Make your home a little bit Smarter ✨💡🏡
💡🏡This tiny device can power up your devices with Amazon Alexa or Google Home. #CapCut #smarthome #smarthomeideas #hometech #shareyourthoughts
SalePriceDre

SalePriceDre

4 likes

Drunk Woman Kicked Out of Airport After Extreme Meltdown #cops #bodycamcops
Tops Moment 👮🏻‍♂️

Tops Moment 👮🏻‍♂️

0 likes

What to offer as a SMM? 📲
Knowing that my days/weeks are never 100% the same makes me happy! Including client work, I also: 📱I assisted an e-commerce startup by sharing my marketing tips with them so they have a successful launch! 📱Created and designed business cards for a local company. 📱And also had someone re
Bria | Monetize with AI 🤖

Bria | Monetize with AI 🤖

12 likes

Posting this again because everyone deserves to know . Instagram maps is sharing your exact location to all your followers. They say it’s turned off by default but many say theirs was on #instagram #news #technews #instagrammap
Cybersecurity Girl

Cybersecurity Girl

24 likes

A white tumbler with a repeating pattern of black cartoon cats wearing blue shirts, with text overlay 'HOW TO MAKE & SELL TUMBLERS FOR FREE!'
A mobile screen displaying the Midjourney website with examples of AI-generated cat images, overlaid on a tumbler with cat designs.
A mobile screen showing the Printify website homepage, highlighting the 'Start for free' button to create an account, overlaid on a cat-designed tumbler.
How To Make & Sell Tumblers For Free With Printify
This is another holiday online side hustle you can do to make money from your phone! I broke down step by step how you can make custom designs and sell them on Printify! They even have a A.I image generator! No excuses! Let's get this holiday bag! 🤑 #digitalproductsforbeginners
NoFaceAllBags

NoFaceAllBags

56 likes

‎Gemini - direct access to Google AI https://share
Exploring the fascinating intersection of Biomimicry and Computational Imaging. A core challenge in both biology and engineering: the "Photon Budget." When light is scarce, you have to get creative with how you collect and process what little you have. Here is a deeper look at how those
EAU_RA

EAU_RA

0 likes

+less than 58$ What’s on my flip phone? LINK⬇️
❗️The LINK to this flip phone is in my BIO❗️💕 It’s the last item RN! This Android flip phone in white is SIM unlocked and supports Softbank 4G network connectivity. With its compact design and flip functionality, it offers convenience and style. Whether you're making calls, sending messages
Randy

Randy

343 likes

A Ben 10 gym audio for you. #fyp #gym #ben10 #ben10omniverse #audio
IzzyywiththeZ

IzzyywiththeZ

0 likes

No more ads! (free)
Learn the free secrets to block all ads on your mobile devices and games! Say goodbye to interruptions and enjoy a smoother experience. Follow these simple steps now! Tags: #AdBlockFree #MobileTips #GamingHacks #TechTutorial #StopAds
NetGuard Technologies, LLC

NetGuard Technologies, LLC

0 likes

Forever grateful for SWC 2.0! 🫶
Ask me how I went from broke SAHM to making an extra 1-5k a week to help with groceries and bills. ALL FROM MY PHONE and the comfort of my own home. Being able to still be present in my kids lives and not working myself to death to still be broke! Now I have the financial freedom to stay home with
Alana Rae17

Alana Rae17

0 likes

How to Install Windows on a Second Hard Drive
Learn how to use AOMEI Cloner to clone your existing system to another drive. This makes it easy to back up and restore data in the event of a system crash or malware attack. Download it today and give it a try! #harddrive #clone #hdd #ssd #windows
RedFFTech

RedFFTech

0 likes

A series I’ve wanted to do forever! As a cyber security expert and bridal makeup artist I hope to share cyber concepts in easy to understand makeup metaphors! Let me know in the comments what topics interest you 💕 #makeupandmalware #mascara #cybersecurity @Lancôme
Betsy H

Betsy H

3 likes

5 Tips to get into Interventional Cardiology 🏥
An industry that thrives day in and day out, that is, the medical field. My entire career has been medical, from being a Certified Medical Assistant to working in the medical device industry as a Medical Device Reporter. The knowledge from my tenure in these roles has paved an opportunity for me to
Timothy Walker

Timothy Walker

49 likes

Quick IPhone secret-ready?🥳 #iphonetips #ios26 #iphone #ios #tech
Michael

Michael

8 likes

Buy Bitcoin
I won’t steer you wrong #discord #bitcoin first then the world #meme #explore #kibinomics
Kibirushin

Kibirushin

1 like

TikTok updates its privacy policy
Carlysle

Carlysle

1 like

How to Make a Dyson Sphere in Sandboxels
#dysonsphere #science #sciencegames #gaming #pixelart
R74n

R74n

7 likes

Never Connect to WiFi in Abandoned Places #igorkryan #secretwifi #schoolsecret #abandonschool #backrooms
Igor Kryan

Igor Kryan

6 likes

How to Fix UE4 Crashes?
Sudden crashes while gaming… 😱 We've summarized the common causes in Unreal Engine 4 and solutions you can try immediately! Plus, backing up your system is essential to prevent data loss from crashes. Stay protected with AOMEI Backupper! 🎁 Limited 30-day code: AMAB-9RV3F-DNLO8-LGDYR #unrea
SmoothTechie

SmoothTechie

1 like

my personal fave heated hair tool
guys i cant explain how much i love this thing. my favorite thing about it is the fan. the fan starts going when it is heated up, which is amazing and it doesn’t take very long. here’s the link if you wanna check it out 🫶🏻 https://langehair.com/products/le-duo?variant=42148730273892&gclid=EAIaI
turtlelover11_

turtlelover11_

15 likes

#creatorsearchinsights #therapeutictiktok #somatichealing #storedtrauma #yellowstonetv
Rawr xD Yuna🌙The.Terror.

Rawr xD Yuna🌙The.Terror.

0 likes

Top Cybersecurity Certificates
There are several reputable cybersecurity certifications that can help you advance your skills and knowledge in the field of cybersecurity. 1. Certified Information Systems Security Professional (CISSP): - CISSP is a globally recognized certification that covers a wide range of cybersecurit
anjali.gama

anjali.gama

110 likes

A flat lay of various white and purple Apple devices, including an iPad, iPhone, Apple Watch, AirPods, and Apple Pencil, arranged on a floral background.
A webpage displaying refurbished tablets, specifically two Apple iPad 10.2" Space Gray 9th Generation 64GB Wifi models, with features like 'CLEANED & TESTED' and 'SECURE DATA WIPE'.
A product listing for an Apple iPad 10.2 (2019) starting at $119.00, advertised as '63% less than new', with details on screen size, network, and RAM.
CHEAP IPADS AND APPLE DEVICES!🌸
Some sites to try to get an iPad or Apple device for cheap: 1. Unclaimed luggage Unclaimed luggage has electronics that are in great working condition for great prices! 2. Backmarket *$25 off code included* At Backmarket you can get Apple devices for cheaper and if your a student you can
Rosie

Rosie

5461 likes

A collage of anatomy and physiology study notes, featuring topics like the heart, blood, respiratory system, and digestive system. It includes titles such as "Chapter 15.1 Patho," "Chapter 14: Blood," and "Chapter 19: Respiratory," along with a section on "Biological Sex and Gender."
Detailed notes for Chapter 17.1 on the Digestive System, defining digestion, mechanical and chemical processes. It lists alimentary canal and accessory organs, accompanied by a large anatomical diagram illustrating the human digestive tract from mouth to anus, including the liver, pancreas, and intestines.
Notes on the layers of the alimentary canal wall (mucosa, submucosa, muscularis externa, serosa) from Chapter 17.1. It includes cross-sectional diagrams of the intestinal wall, a table summarizing layer compositions and functions, and illustrations of mixing movements and segmentation in the digestive tract.
Past A&P notes that helped me survive!
‼️I CAN NO LONGER SEND PDFs. SORRY LOVES! IF YOU HAVE INSTAGRAM, DM ME AND ASK ME WHAT YOU NEED AND I WILL STILL TRY AND HELP YOU. MY INSTRAGRAM IS IN MY BIO. YELL AT LEMON8 FOR TAKING DIRECT MESSAGE AWAY🥲‼️ Hey everyone! I know that a lot of people struggle with A&P aka anatomy and physiolo
Maya Fosdick

Maya Fosdick

701 likes

Custom QR codes in seconds
Create and customize your QR codes in seconds with #JustQuickTools ✨💙 #unlimitedaccess #viral #lemon #lemon8
officialjerrynoel

officialjerrynoel

1 like

This video has been sitting in my drafts since 2025. Not because it wasn’t good, but because I waited for “perfect.” Just the same way we take the perfect picture and over staring at it, opens up the imperfections in the photo🤣🤣🤣 Today, I realized the message in this video still matters: persona
Abby❤️💎

Abby❤️💎

1 like

Indiana Mish (meesh)

Indiana Mish (meesh)

0 likes

Instagram is sharing your exact location to all your followers Turn this off ASAP. #techtips #instagram #news #technews
Cybersecurity Girl

Cybersecurity Girl

10 likes

A partial screenshot of a mobile device settings menu, displaying a list of applications and services such as SecureElementApplication, Settings, Setup, Shell, and Sim App Dialog, each with a green checkmark.
A partial screenshot of a mobile device settings menu, displaying a list of applications and services such as Retail Mode, Rethink, Revoker Services, RilCap, RobotoSlabRegular, RookeryRegular, Round, Rounded Rectangle, RsuService, and RsuSleService, each with a green checkmark.
A partial screenshot of a mobile device settings menu, displaying a list of applications and services such as Print Spooler, Private Compute Services, ProxyHandler, Punch Hole cutout, RCS Config Service, RCS UA, Recorder, Remote Provisioner, and Retail Mode, each with a green checkmark.
gary7ennyson

gary7ennyson

0 likes

Travel apps you need before you leave pt.1 🌎
Top 5 Must-Have Apps for Your Solo Travel Adventure (Trust me, they’ll save your butt!) 🚀✈️🌍 1. Google Maps – Your best friend when you’re lost (which will be…often). It’s like a personal GPS that never judges you for taking the wrong turn. Bonus points: It can help you avoid sketchy back alleys
Nyah Misfit

Nyah Misfit

498 likes

the best note taking device ever (the remarkable)
i am someone who absolutely loves to learn and i love to study. i know its weird but i really did love school and cant wait to go back and get my masters in cybersecurity because i just love learning so much! in my many years of school i really decided i loved handwritten notes best. taking notes o
lilly

lilly

146 likes

Solved: exFAT Drive Not Recognized in Windows 10
Why exFAT drive not recognized in Windows 10/11 and what’s the best solution to it? Read the following post to get the answers. #drive #filesystem #recognized
Techcrafter

Techcrafter

0 likes

Unboxing my $25 buds 3 pro!
#wirelessearbuds #samsunggalaxy #unboxingvideo #honestreview #galaxybuds3pro
Fence Finds 💛

Fence Finds 💛

7 likes

See more