Brain Food Botnet
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Threat details
It is distributed via spam email containing URL links that when opened, will cause the redirection to web servers infected with the Brain Food PHP script.
Its purpose is to collect personal information by redirecting users to compromised sites. Due to the PHP script's polymorphic code, that can change each time it runs, allowing Brain Food to remain undetected by most antivirus platforms.
Remote execution of shell code is possible on web servers which are configured to allow the PHP 'system' command. Operators monitor statistics and actions via Command and Control servers (C2) allowing the whole botnet to switch to new landing pages or blacklist new URLs simultaneously.
Remediation steps
| Type | Step |
|---|---|
|
Ensure that there is no unknown PHP scripts hosted on the web server and that PHP is unable to execute system commands remotely. Guidance around usage of the PHP System command can be found here. Additionally, to prevent and detect a infection ensure that:
|
Last edited: 17 February 2020 12:39 pm