Since Cado Security Labs’ recent discovery, its researchers have been monitoring and reporting the exponential growth of the P2Pinfect malware, which acts as a cross-platform botnet agent exploiting cloud environments.
Today Cado Security will reveal a new P2Pinfect variant compiled for the Microprocessor without Interlocked Pipelined Stages (MIPS) architecture that its researchers have discovered.
This novel discovery demonstrates that the threat actors behind P2P2infect are increasingly targeting routers, IoT, and other embedded devices.
The new sample includes updated evasion mechanisms, making it more difficult for researchers to analyze dynamically, including Virtual Machine (VM) detection methods for embedded payloads, debugger detection, and anti-forensics on Linux hosts.
You can read the details here.
Like this:
Like Loading...
Related
This entry was posted on December 4, 2023 at 9:01 am and is filed under Commentary with tags Cado Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
New P2Pinfect Variant: Malware’s Threat Actors Increasingly Targeting IoT, Routers, Embedded Devices
Since Cado Security Labs’ recent discovery, its researchers have been monitoring and reporting the exponential growth of the P2Pinfect malware, which acts as a cross-platform botnet agent exploiting cloud environments.
Today Cado Security will reveal a new P2Pinfect variant compiled for the Microprocessor without Interlocked Pipelined Stages (MIPS) architecture that its researchers have discovered.
This novel discovery demonstrates that the threat actors behind P2P2infect are increasingly targeting routers, IoT, and other embedded devices.
The new sample includes updated evasion mechanisms, making it more difficult for researchers to analyze dynamically, including Virtual Machine (VM) detection methods for embedded payloads, debugger detection, and anti-forensics on Linux hosts.
You can read the details here.
Share this:
Like this:
Related
This entry was posted on December 4, 2023 at 9:01 am and is filed under Commentary with tags Cado Security. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.