Research from Avast has been published detailing the operation of the XOR.DDoS trojan, designed to infect Linux systems. Will 2015 be the year of DDOS Extortion?

As the name suggests, the purpose of the trojan is to support a DDOS (Distributed Denial of Service) network. DDOS is still one of the most difficult attacks to defend against - by definition, the attack is perpetrated simultaneously from large numbers of devices including home and business users wherever the trojan has been deployed. This makes the standard countermeasure for DDOS - blocking/blacklisting associated IP addresses - extremely hard.

During the Christmas holidays we saw how devastatingly effective DDOS attacks can be - both Microsoft XBOX Live and Sony PlayStation servers were crippled by a prolonged DDOS attack from the Lizard Squad hacking group. The Lizard Squad have now claimed that these attacks were simply a 'marketing campaign' to demonstrate their capabilities, and that their DDOS service is now available for hire. DDOS attacks have been used to extort ransoms in the past, with Vimeo, Shutterstock, MailChimp and Bit.ly all being subject to DDOS coercion.

Defending against malware like the XOR.DDoS trojan requires a layered approach. The increased use of zero-day malware makes anti-virus systems less effective and therefore system hardening measures need to be used to stop or disrupt the deployment of the trojan and its rootkit. Real-time file integrity monitoring is also essential to at least detect breach activity if an infection succeeds, so allowing remediation work to take place before a more widespread infection took hold and inflicted damage.

Links to sources quoted are below:

Linux DDoS Trojan hiding itself with an embedded rootkit

Lizard Squad's Xbox Live, PSN attacks were a 'marketing scheme' for new DDoS service

Tally of Cyber Extortion Attacks on Tech Companies Grows

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.