Attacks Targeting Linux SSH Servers to Install SVF DDoS Bot
A recent attack on poorly managed Linux servers has been identified, involving the installation of SVF Botnet, a DDoS Bot malware developed in Python. The malware uses Discord as its C&C server and employs multiple proxy servers for DDoS attacks. The threat actor gains access through weak SSH credentials and installs the bot using specific commands. SVF Bot supports various DDoS attack methods, primarily L7 HTTP Flood and L4 UDP Flood. It uniquely utilizes public proxy addresses for HTTP flood attacks, enhancing its effectiveness. The malware can receive commands from the threat actor, turning infected Linux servers into DDoS Bots. To protect against such attacks, administrators are advised to use strong passwords, regularly update systems, and implement security measures like firewalls.
Pulse ID: 68a5a890aad2db48780163d5
Pulse Link: https://otx.alienvault.com/pulse/68a5a890aad2db48780163d5
Pulse Author: AlienVault
Created: 2025-08-20 10:50:56
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CandC #CyberSecurity #DDoS #Discord #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #Proxy #Python #RAT #SSH #UDP #Word #bot #botnet #AlienVault