Gorilla Botnet: A New Threat Inspired by Mirai, Targeting Global Networks

Listen to this Post

2025-01-09

In a startling revelation, cybersecurity researchers have uncovered a new botnet malware family named Gorilla (also known as GorillaBot). Drawing inspiration from the infamous Mirai botnet, Gorilla has emerged as a formidable threat, launching large-scale distributed denial-of-service (DDoS) attacks across the globe. With its sophisticated techniques and widespread impact, Gorilla is a stark reminder of the evolving dangers in the cybersecurity landscape.

The Rise of Gorilla Botnet

Discovered by cybersecurity firm NSFOCUS, Gorilla has been active since at least September 2024, issuing over 300,000 attack commands in less than a month. On average, the botnet has been responsible for 20,000 daily DDoS attack commands, targeting over 100 countries. Among the most affected nations are China, the U.S., Canada, and Germany, with sectors such as education, government, telecommunications, banking, gaming, and gambling bearing the brunt of the attacks.

Gorilla employs a variety of DDoS attack methods, including UDP flood, ACK BYPASS flood, Valve Source Engine (VSE) flood, SYN flood, and ACK flood. The use of the UDP protocol is particularly concerning, as its connectionless nature allows for IP spoofing, enabling the botnet to generate massive amounts of traffic and overwhelm targeted systems.

Sophisticated Techniques and Capabilities

What sets Gorilla apart is its advanced capabilities and adaptability. The botnet supports multiple CPU architectures, including ARM, MIPS, x86_64, and x86, making it compatible with a wide range of devices, from IoT gadgets to cloud servers. It connects to one of five predefined command-and-control (C2) servers to receive attack instructions, showcasing its organized and scalable infrastructure.

In a surprising twist, Gorilla also exploits a known vulnerability in Apache Hadoop YARN RPC to achieve remote code execution. This flaw, first exploited in 2021, highlights the botnet’s ability to leverage older vulnerabilities for new attacks. Additionally, Gorilla ensures persistence on infected devices by creating a service file named custom.service in the “/etc/systemd/system/” directory. This file is configured to run automatically at system startup, downloading and executing a malicious shell script (“lol.sh”) from a remote server.

To further entrench itself, Gorilla adds commands to critical system files like “/etc/inittab,” “/etc/profile,” and “/boot/bootcmd”, ensuring the malware is reactivated upon system startup or user login. This multi-layered persistence mechanism demonstrates Gorilla’s high level of sophistication and its ability to evade detection.

A Growing Threat

NSFOCUS has highlighted

The emergence of Gorilla underscores the need for robust cybersecurity measures, particularly for IoT devices and cloud infrastructure. As botnets continue to evolve, organizations must remain vigilant, regularly updating their systems and monitoring for unusual activity.

What Undercode Say:

The discovery of the Gorilla botnet is a chilling reminder of the ever-present threat posed by cybercriminals. Inspired by the infamous Mirai botnet, Gorilla represents a new wave of malware that combines sophistication, adaptability, and destructive potential. Here’s an in-depth analysis of what makes Gorilla a significant threat and what it means for the future of cybersecurity:

1. The Mirai Legacy Lives On

Gorilla’s reliance on the leaked Mirai source code is a testament to the lasting impact of the 2016 botnet that disrupted major websites and services worldwide. Mirai’s open-source nature has allowed threat actors to build upon its foundation, creating more advanced and targeted variants like Gorilla. This trend highlights the dangers of leaked malware code and the need for stricter controls over such information.

2. Global Reach, Local Impact

With attacks targeting over 100 countries, Gorilla demonstrates the globalized nature of cyber threats. While China, the U.S., Canada, and Germany are the most affected, no region is immune. The botnet’s focus on critical sectors like education, government, and finance underscores its potential to cause widespread disruption, both economically and socially.

3. Exploiting Known Vulnerabilities

Gorilla’s exploitation of the Apache Hadoop YARN RPC vulnerability is a stark reminder that older vulnerabilities remain a goldmine for attackers. Despite being known since 2021, this flaw continues to be exploited, emphasizing the importance of timely patching and vulnerability management. Organizations must prioritize updating their systems to close these security gaps.

4. Persistence and Evasion

The botnet’s multi-layered persistence mechanisms, including the use of system service files and critical system configurations, showcase its ability to evade detection and maintain long-term control over infected devices. This level of sophistication is indicative of a well-funded and organized threat actor, likely with extensive experience in malware development.

5. The IoT and Cloud Security Challenge

Gorilla’s compatibility with multiple CPU architectures highlights the vulnerability of IoT devices and cloud infrastructure. As these technologies become more prevalent, they also become prime targets for botnets. Manufacturers and service providers must prioritize security by design, ensuring devices are resilient to such attacks.

6. The Role of Encryption

The use of encryption algorithms by Gorilla to hide key information is a growing trend among cybercriminals. While encryption is a vital tool for securing data, its misuse by threat actors complicates detection and analysis efforts. Cybersecurity professionals must develop new strategies to counteract this trend.

7. A Call for Collaboration

The fight against botnets like Gorilla requires global collaboration between governments, private organizations, and cybersecurity experts. Sharing threat intelligence, coordinating responses, and implementing robust security frameworks are essential to mitigating such threats.

8. The Future of Botnets

Gorilla is a harbinger of what’s to come in the world of botnets. As attackers continue to innovate, we can expect to see more advanced malware with enhanced capabilities. The cybersecurity community must stay ahead of these developments by investing in research, developing new tools, and fostering a culture of security awareness.

In conclusion, the Gorilla botnet is a wake-up call for the cybersecurity industry. Its sophisticated techniques, global reach, and destructive potential make it a formidable adversary. By understanding its methods and learning from its emergence, we can better prepare for the next wave of cyber threats. The battle against botnets is far from over, but with vigilance and collaboration, we can mitigate their impact and protect our digital future.

References:

Reported By: Thehackernews.com
https://www.pinterest.com
Wikipedia: https://www.wikipedia.org
Undercode AI: https://ai.undercodetesting.com

Image Source:

OpenAI: https://craiyon.com
Undercode AI DI v2: https://ai.undercode.helpFeatured Image