HomeCyber BalkansNew DDoS malware targets Apache Hadoop and Druid servers

New DDoS malware targets Apache Hadoop and Druid servers

Published on

spot_img

A recent development in the realm of organizations utilizing Apache’s big-data solutions has sparked concern with the discovery of a new variant of the Lucifer DDoS botnet malware that specifically targets Apache Hadoop and Apache Druid servers. This sophisticated malware campaign takes advantage of existing vulnerabilities and misconfigurations within these systems to carry out malicious activities such as cryptojacking and distributed denial-of-service (DDoS) attacks.

The Lucifer malware is designed to exploit known weaknesses and vulnerabilities within Apache Hadoop and Apache Druid environments, as detailed in a report by Aquasec. One critical vulnerability that the malware capitalizes on is CVE-2021-25646, a command injection vulnerability in Apache Druid that allows authenticated attackers to execute arbitrary code. By leveraging these vulnerabilities, attackers can gain unauthorized access to the systems, enabling them to conduct their malevolent activities.

What sets the Lucifer malware apart is its ability to combine both cryptojacking and DDoS capabilities, creating a hybrid threat. Once the malware infiltrates vulnerable Linux servers, it can transform them into Monero cryptomining bots. Additionally, the malware has the capability to initiate DDoS attacks, further compromising the integrity and availability of the targeted servers.

The Lucifer campaign operates in distinct phases, showcasing the evolving tactics employed by attackers. It starts by targeting misconfigured Hadoop servers and then progresses to Apache Druid servers by exploiting the CVE-2021-25646 vulnerability to download and execute the Lucifer malware. This campaign highlights the adaptability and persistence of attackers, underscoring the importance of maintaining robust security measures. Organizations are advised to review their Apache Hadoop and Druid configurations for common misconfigurations and ensure that all systems are patched and up-to-date to mitigate the risk of such attacks.

The emergence of the Lucifer malware targeting Apache’s big-data stack serves as a stark reminder of the constant cyber threats organizations face. With over 3,000 unique attacks detected in the past month alone, it is crucial for organizations to implement heightened security measures. Proactive scanning for vulnerabilities, timely patching, and the use of runtime detection to identify and thwart unknown threats are essential steps in enhancing security posture.

As the cyber threat landscape continues to evolve, staying informed and vigilant is imperative. The Lucifer DDoS botnet malware campaign targeting Apache Hadoop and Apache Druid servers exemplifies the sophisticated tactics employed by attackers to exploit vulnerabilities for malicious purposes. Organizations can protect their critical infrastructure against such threats by adopting comprehensive security strategies and staying abreast of the latest cybersecurity developments.

In conclusion, the discovery of the Lucifer DDoS botnet malware targeting Apache’s big-data solutions underscores the need for organizations to remain vigilant and proactive in their cybersecurity efforts. By implementing robust security measures, organizations can defend against malicious threats and safeguard their valuable data and systems.

Source link

Latest articles

UK’s NCSC Advises Enterprises to Provide Customers with Default Passkeys

NCSC Analysis Highlights the Vulnerabilities of Traditional Authentication Methods The National Cyber Security Centre (NCSC)...

Rogue Users Allegedly Access Anthropic’s Restricted Claude Mythos Model

Unauthorized Users Gain Access to Controversial Claude Mythos Preview AI Model In a surprising turn...

Google Prepares Agents for the Mythos Age

Wiz, AI-BOMs, and the Challenge of Securing AI Development Across Environments In an era marked...

Cyber-Attacks in the Education Sector Increase by 63% Yearly

According to a report by Quorum Cyber, educational institutions worldwide experienced a notable surge...

More like this

UK’s NCSC Advises Enterprises to Provide Customers with Default Passkeys

NCSC Analysis Highlights the Vulnerabilities of Traditional Authentication Methods The National Cyber Security Centre (NCSC)...

Rogue Users Allegedly Access Anthropic’s Restricted Claude Mythos Model

Unauthorized Users Gain Access to Controversial Claude Mythos Preview AI Model In a surprising turn...

Google Prepares Agents for the Mythos Age

Wiz, AI-BOMs, and the Challenge of Securing AI Development Across Environments In an era marked...