This website uses cookies

Our website, platform and/or any sub domains use cookies to understand how you use our services, and to improve both your experience and our marketing relevance.

🔊 Web Growth Summit is here! Learn from industry experts on July 17-18, 2024. REGISTER NOW→

Muhstik Botnet Exploits Apache RocketMQ Flaw to Amplify DDoS Attacks

Updated on June 7, 2024

2 Min Read
Muhstik Botnet Apache RocketMQ Flaw


The Muhstik botnet, known for its distributed denial-of-service (DDoS) attacks, is exploiting a recently patched security vulnerability in Apache RocketMQ to commandeer vulnerable servers and expand its reach.

via GIPHY

Aqua, a cloud security firm, reported that Muhstik is notorious for targeting IoT devices and Linux-based servers, infecting them for cryptocurrency mining, and launching DDoS attacks. This botnet, first documented in 2018, frequently leverages known security flaws in web applications for propagation.

via GIPHY

The latest vulnerability exploited by Muhstik is CVE-2023-33246 (CVSS score: 9.8), a critical flaw in Apache RocketMQ. This flaw allows remote, unauthenticated attackers to perform remote code execution by manipulating the RocketMQ protocol or using the update configuration function.

Upon exploiting this vulnerability, the attackers execute a shell script from a remote IP address, which then downloads the Muhstik binary (“pty3”) from another server. The malware gains persistence by copying itself to multiple directories and modifying the /etc/inittab file, which controls the processes started during the booting of a Linux server.

Naming the binary “pty3” is likely an attempt to disguise it as a pseudoterminal (“pty“) and evade detection. Additionally, the malware is copied to directories like /dev/shm, /var/tmp, /run/lock, and /run to execute directly from memory, minimizing traces on the system.

Muhstik’s capabilities include gathering system metadata, moving laterally to other devices via secure shell (SSH), and establishing contact with a command-and-control (C2) domain to receive further instructions using the Internet Relay Chat (IRC) protocol. The primary goal of Muhstik is to use compromised devices for various flooding attacks, overwhelming network resources, and causing denial-of-service conditions.

Despite the public disclosure of the RocketMQ flaw over a year ago, 5,216 vulnerable instances remain exposed to the internet. Organizations must update to the latest version to mitigate these threats.

In addition to DDoS attacks, previous campaigns have detected cryptomining activity following the execution of Muhstik malware. These objectives are aligned, as infecting more machines enables attackers to mine more cryptocurrency using the compromised machines’ electrical power.

The disclosure coincides with the AhnLab Security Intelligence Center (ASEC), revealing that poorly secured MS-SQL servers are also being targeted by various types of malware, including ransomware, remote access trojans, and proxyware.

via GIPHY

ASEC advises administrators to use strong, frequently changed passwords and apply the latest patches to safeguard against brute-force and dictionary attacks.

Share your opinion in the comment section. COMMENT NOW

Share This Article

Start Growing with Cloudways Today.

Our Clients Love us because we never compromise on these

Abdul Rehman

Abdul is a tech-savvy, coffee-fueled, and creatively driven marketer who loves keeping up with the latest software updates and tech gadgets. He's also a skilled technical writer who can explain complex concepts simply for a broad audience. Abdul enjoys sharing his knowledge of the Cloud industry through user manuals, documentation, and blog posts.

×

Thankyou for Subscribing Us!

×

Webinar: How to Get 100% Scores on Core Web Vitals

Join Joe Williams & Aleksandar Savkovic on 29th of March, 2021.

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Want to Experience the Cloudways Platform in Its Full Glory?

Take a FREE guided tour of Cloudways and see for yourself how easily you can manage your server & apps on the leading cloud-hosting platform.

Start my tour

CYBER WEEK SAVINGS

  • 0

    Days

  • 0

    Hours

  • 0

    Mints

  • 0

    Sec

GET OFFER

For 4 Months &
40 Free Migrations

For 4 Months &
40 Free Migrations

Upgrade Now