Home » today » Business » FritzFrog is a P2P botnet attacking SSH and mining Monero

FritzFrog is a P2P botnet attacking SSH and mining Monero

Experts from Guardicore discovered the FritzFrog botnet, which uses sophisticated peer-to-peer (P2P) methods to communicate between nodes. The network thus does not have a central point and the individual parts communicate completely independently. The botnet actively searches for and attacks SSH servers and installs its own public key for future logins. At the same time, Monero cryptocurrency is benefiting on the infected servers.

The malware is written in the Go language and, according to the available information, it has already tried tens of millions of different servers, at least 500 of which have been successfully attacked. Experts have already discovered 20 different versions of this botnet. The process is disguised as ifconfig, libexec whose nginx and it only lives in memory, so you won’t find it on disk.

If your server is infected, you can find it in the file authorized_keys the following public key:

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJYZIsncBTFc+iCRHXkeGfFA67j+kUVf7h/IL+sh0RXJn7yDN0vEXz7ig73hC//2/71sND+x+Wu0zytQhZxrCPzimSyC8FJCRtcqDATSjvWsIoI4j/AJyKk5k3fCzjPex3moc48TEYiSbAgXYVQ62uNhx7ylug50nTcUH1BNKDiknXjnZfueiqAO1vcgNLH4qfqIj7WWXu8YgFJ9qwYmwbMm+S7jYYgCtD107bpSR7/WoXSr1/SJLGX6Hg1sTet2USiNevGbfqNzciNxOp08hHQIYp2W9sMuo02pXj9nEoiximR4gSKrNoVesqNZMcVA0Kku01uOuOBAOReN7KJQBt

The botnet is spread by guessing passwords, so the defense is to use strong passwords, or better yet, log in with public key.


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.