Zerobot Attack

Released: Dec 27, 2022


High Severity

IoT Platform

Attack Type


Go-based malware exploiting multiple vulnerabilities

Zerobot is a Go-based botnet that spreads primarily through IoT and web application vulnerabilities. According to Fortinet research analysis the most recent distribution of Zerobot includes additional capabilities such a new DDoS attack capabilities and exploiting Apache vulnerabilities. Learn More »

Background

In November 2022, FortiGuard Labs observed a unique botnet written in the Go language known as Zerobot which contains several modules, including self-replication, attacks for different protocols, and self-propagation. For more information on Zerobot Malware, see the link to Fortinet blog below. Please note, ZeroBot Malware does not relates to ZeroBot Chatbot or ZeroBot AI

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


December 06, 2022: Fortinet posted a security blog research about Zerobot at https://www.fortinet.com/blog/threat-research/zerobot-new-go-based-botnet-campaign-targets-multiple-vulnerabilities


December 12, 2022: Microsoft uncovers new Zerobot 1.1 capabilities and posted a blog at https://www.microsoft.com/en-us/security/blog/2022/12/21/microsoft-research-uncovers-new-zerobot-capabilities

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • AV

  • Vulnerability

  • AV (Pre-filter)

  • Behavior Detection

  • IPS

  • Web App Security

  • Application Firewall

  • Web Filter

  • Botnet C&C

DETECT
  • IOC

  • Outbreak Detection

  • Threat Hunting

  • Content Update

RESPOND
  • Automated Response

  • Assisted Response Services

RECOVER
  • InfoSec Services

IDENTIFY
  • Attack Surface Monitoring (Inside & Outside)

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.


Loading ...

Indicators of compromise Indicators of compromise
IOC Threat Activity

Last 30 days

Chg

Avg 0