Summary
Affected platforms
The following platforms are known to be affected:
Threat details
At the time of publication, it is unclear how GoBrut is intially distributed, although there are unconfirmed reports indicating it may delivered manually using exploits for known vulnerabilities in the PhpMyAdmin tool.
Once installed, GoBrut will connect to a command and control (C2) server before executing a module called 'StartBrut'. This module will attempt to gain access to other systems or devices on the network. If successful, it will install a copy of itself on these devices before scanning for other vulnerable devices on the Internet. It will then send the IP addresses of any identified devices back to the C2 server.
Update
A new GoBrut variant has been observed being delivered as an ELF file that is able to target Unix systems.
Remediation steps
| Type | Step |
|---|---|
|
To prevent and detect an infection, ensure that:
|
Last edited: 14 February 2020 2:53 pm