Friday, February 3, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > 8220 Gang infects its botnet to nearly 30,000 victims globally

8220 Gang infects its botnet to nearly 30,000 victims globally

8220 Gang, a crimeware group, expanded its botnet to approximately 30,000 hosts worldwide, targeting cloud vulnerabilities and poorly secured configurations.


Hanife Diktas Hanife Diktas
July 20, 2022
2 min read
8220 Gang expands the botnet to nearly 30,000 victims globally
  • 8220 Gang has steadily improved their simple, yet powerful, Linux infection scripts to expand a botnet and prohibited cryptocurrency miners.
  • The group has made changes to expand the botnet to nearly 30,000 victims globally.
  • PwnRig, the IRC Botnet, and the generic infection script are all incredibly simple and used opportunistically in group targeting.

In a blog post, the technology monitoring division of SentinelOne, SentinelLabs, published its findings about a new campaign started by 8220 Gang. According to analysis and observation, the criminal group uses an infection script that acts as the main code for the botnet to run. The script is badly coded and usually contains unused or outdated functions, allowing trivial tracking over time.

8220 Gang uses new methods

Also known as 8220 Mining Group, 8220 Gang, was first publicly reported by Talos in 2018. The name comes from the group’s original use of port 8220 for C2 network communications. The 8220 Gang targets the victims who are typically, but not entirely, users of cloud networks operating unprotected and misconfigured Linux applications and services. The cloud infrastructures AWS, Azure, GCP, Aliyun, and QCloud are often infected via publicly accessible hosts running Docker, Confluence, Apache WebLogic, and Redis.

In the new campaign, observed and analyzed by SentinelLabs researchers, the group is utilizing long-running sets of infrastructure, bringing the botnet numbers to approximately 30,000 infected hosts. They use new tactics to the current script to expand their botnet. And it appears to be highly effective at infecting targets despite its lack of detection evasion mechanisms. The crimeware group makes use of a new version of the IRC botnet, PwnRig cryptocurrency miner, and its generic infection script. The script’s actions are below;

  • Victim host preparation and cleanup, including the removal of common cloud security tools.
  • IRC Botnet malware and miner download/configuration and remediation persistence.
  • Tsunami IRC Botnet malware sample validation and connectivity.
  • Internal network SSH scanner with lateral spreading capability.
  • PwnRig cryptocurrency miner execution.
  • Local SSH key collection, connectivity testing, and lateral spreading.

In late June 2022, the group started making use of a separate file they name “Spirit” applied for using SSH brute forcing functionality outside the main script. Spirit contains a list of nearly 450 hardcoded credentials harmonizing to a wide range of root usernames, and default Linux device and application passwords. To avoid honeypot traps used by researchers, 8220 Gang makes use of block lists in the infection script.

For its cybercrime campaign, 8220 Gang uses an updated PwnRig Miner that is a custom XMRig miner. PwnRig can make fake pool requests for government domains, including Brazil’s federal government domain.

See more Cybersecurity News


Hanife Diktas

Hanife Diktas

Hanife Diktas is a news editor at Cloud7 News. Hanife started her career in the manufacturing sector in the marketing and sales department. Hanife worked in industrial equipment, renewable energy, and technology sectors. Hanife Diktas did her bachelor's degree in business administration and completed a master's degree in management at Yeditepe University in Istanbul, Turkey. Hanife is a Linux user, and she also contributed to AlmaLinux OS at the beginning of the project. Hanife focuses on web hosting, cloud computing, data centers, cybersecurity, Linux OS, and virtualization technologies. Hanife enjoys creating content and shooting videos covering these topics.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Namecheap introduces Domain Vault

Namecheap introduces Domain Vault

Related News

LockBit encryptor source code is updated

LockBit encryptor source code is updated

February 3, 2023 4:40 pm
Fortinet is expanding its SOC offerings portfolio

Fortinet is expanding its SOC offerings portfolio

February 3, 2023 2:00 pm
Radware announces a new partner program

Radware announces a new partner program

February 3, 2023 1:30 pm
APTs are looking for developers to hire with hefty paychecks

APTs are looking for developers to hire with hefty paychecks

February 1, 2023 2:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • LockBit encryptor source code is updated
  • LibreOffice 7.5 Community is released. What’s new?
  • NTT to add Palo Alto Networks’ solution to its portfolio
  • Gcore announces partnership with Super Protocol
  • Fortinet is expanding its SOC offerings portfolio

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.