0x1 Posted May 8, 2022 Share Posted May 8, 2022 (edited) BotenaGo Malware Targets Millions of IoT Devices This is the hidden content, please Sign In or Sign Up The malware is light, easy to use and powerful. BotenaGo’s 2,891 lines of code are all that’s needed for a malware attack, including, but not limited to, installing a reverse shell and a telnet loader used to create a backdoor to receive commands from its command-and-control (C2) operator. Caspi explained that BotenaGo has automatic setup of its 33 exploits, presenting an attacker a “ready state” to attack a vulnerable target and infect it with an appropriate payload based on target type or operating system. The source code leaked to GitHub and depicted below features a “supported” list of vendors and software used by BotenaGo to target its exploits at a slew of routers and IoT devices. This is the hidden content, please Sign In or Sign Up Edited May 8, 2022 by 0x1 Link to comment Share on other sites More sharing options...
Recommended Posts