A malware botnet known as ‘Ddostf’ has been identified targeting MySQL servers, repurposing them into a DDoS-as-a-Service platform for rent by cybercriminals, according to researchers at AhnLab Security Emergency Response Center (ASEC). The botnet exploits vulnerabilities in unpatched MySQL environments or uses brute-force tactics to compromise servers.
Furthermore, leveraging user-defined functions (UDFs), the attackers execute commands, enabling the injection of the Ddostf DDoS bot. The malware, originating from China and active for seven years, stands out for its resilience against takedowns, connecting to new command and control (C2) addresses.
Additionally, the Ddostf malware campaign is centered on enslaving MySQL servers, transforming them into a DDoS-as-a-Service platform available for rent by cybercriminals, as revealed by ASEC researchers. The attackers exploit weaknesses in MySQL security, either through vulnerabilities or by brute-forcing administrator credentials.
At the same time, utilizing user-defined functions (UDFs), the malicious actors execute commands, introducing the primary payload—Ddostf DDoS bot. Notably, the malware, with Chinese origins and a history spanning seven years, exhibits resilience against takedowns by seamlessly connecting to new command and control (C2) addresses.
In a concerning development, the ‘Ddostf’ malware has been uncovered orchestrating a campaign targeting MySQL servers, reconfiguring them into a rentable DDoS-as-a-Service platform for use by cybercriminals, according to researchers from ASEC. The malware exploits vulnerabilities in MySQL environments or employs brute-force techniques to compromise servers, utilizing user-defined functions (UDFs) to execute commands and facilitate the injection of the Ddostf DDoS bot. Originating from China and active for seven years, Ddostf distinguishes itself with resilience against takedowns, maintaining its operations by connecting to new command and control (C2) addresses.
Reference: