Threat Actors Target Linux SSH Servers to Deploy SVF Botnet

Threat Actors Target Linux SSH Servers to Deploy SVF Botnet

AhnLab Security Intelligence Center (ASEC) has been actively tracking cyber threats exploiting vulnerable Linux servers through strategically deployed honeypots, with SSH services using weak credentials emerging as a prime target for distributed denial-of-service (DDoS) and cryptocurrency mining actors.

In a recent incident, ASEC observed threat actors successfully infiltrating a honeypot Linux server via brute-force attacks on SSH, subsequently deploying the SVF Botnet malware.

This Python-based DDoS bot, attributed to the “SVF Team,” leverages Discord as its command-and-control (C&C) infrastructure and incorporates proxy servers to enhance attack evasion.

The installation process involves creating a virtual environment, installing dependencies like discord.py, requests, aiohttp, and lxml, followed by downloading the main.py script from a termbin URL and executing it with a server group parameter, such as “-s 5,” to facilitate grouped command execution.

Botnet Functionality

Upon, the SVF Botnet authenticates with a Discord bot token upon execution, enabling remote control while reporting the infected server’s designated group via webhook for targeted DDoS orchestration.

SVF Bot

Its command set predominantly supports Layer 7 (L7) HTTP flood and Layer 4 (L4) UDP flood attacks, with variants including customizable parameters for threads, packet strength, and concurrency.

Unique to SVF is its proxy integration: it scrapes public proxy lists from multiple GitHub repositories and websites, validates them by attempting Google logins, and randomly selects proxies during HTTP floods to obfuscate origins and bypass defenses.

Commands like $load populate the proxy pool, while $customhttp and $customudp enable tailored assaults.

Additional directives handle bot restarts, crashes, and attack halts, reflecting a modular design despite its simplicity.

Post-update, the bot fetches improved versions from a specific IP, suggesting potential evolution into more sophisticated strains.

Security Implications

This exploitation underscores the risks to inadequately secured Linux environments, transforming them into unwitting DDoS nodes under threat actor control.

Administrators must enforce robust, frequently rotated passwords to thwart brute-force and dictionary attacks, apply the latest patches against vulnerabilities, and deploy firewalls to restrict external access.

Updating endpoint protection like AhnLab V3 is crucial for preemptive malware detection. As threat actors increasingly pivot to open-source ecosystems, proactive monitoring via honeypots remains vital for intelligence gathering and threat mitigation.

Indicators of Compromise (IOCs)

Type Value Description
MD5 cffe3fb6cb3e4b9b453c4147bdcd8c12 Malware Hash
URL http://146.59.239.144:55/ Download URL
URL https://termbin.com/4ccx Script Download URL
IP 185.254.75.44 Attacker IP

Get Free Ultimate SOC Requirements Checklist Before you build, buy, or switch your SOC for 2025 - Download Now


Source link