{"id":19210,"date":"2021-03-08T08:46:49","date_gmt":"2021-03-08T07:46:49","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=19210"},"modified":"2021-03-08T08:46:49","modified_gmt":"2021-03-08T07:46:49","slug":"gafgyt-botnet-familie-zielt-auf-d-link-citrix-und-iot","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/03\/08\/gafgyt-botnet-familie-zielt-auf-d-link-citrix-und-iot\/","title":{"rendered":"Gafgyt botnet family targets D-Link, Citrix and IoT"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/03\/07\/gafgyt-botnet-familie-zielt-auf-d-link-citrix-und-iot\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Security researchers have recently encountered a family of botnets called Gafgyt that targets D-Link, Citrix and IoT devices. It is the first malware family to attack vulnerabilities in devices via the Tor network.<\/p>\n<p><!--more--><\/p>\n<p>I became aware of the issue the days via the following <a href=\"https:\/\/twitter.com\/threatpost\/status\/1367868002004303873\" target=\"_blank\" rel=\"noopener\">tweet<\/a>, which is explained in more detail in <a href=\"https:\/\/threatpost.com\/d-link-iot-tor-gafgyt-variant\/164529\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>. <\/p>\n<p><a href=\"https:\/\/twitter.com\/threatpost\/status\/1367868002004303873\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Gafgyt botnet family targets D-Link, Citrix and IoT\" alt=\"Gafgyt botnet family targets D-Link, Citrix and IoT\" src=\"https:\/\/i.imgur.com\/CzWBXEG.png\"><\/a><\/p>\n<p>Gafgyt is a botnet that was uncovered in 2014. It is notorious for launching large-scale distributed denial-of-service (DDoS) attacks. Security researchers now discovered the activities of the latest variant, which they call Gafgyt_tor, for the first time on February 15, 2015.<\/p>\n<p>To evade detection, Gafgyt_tor uses the Tor anonymization network to hide its command-and-control (C2) communications and encrypts sensitive strings in messages. The use of Tor by malware families is nothing new, but researchers said they have not seen Gafgyt exploit the anonymity network before. More details can be found in <a href=\"https:\/\/threatpost.com\/d-link-iot-tor-gafgyt-variant\/164529\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Security researchers have recently encountered a family of botnets called Gafgyt that targets D-Link, Citrix and IoT devices. It is the first malware family to attack vulnerabilities in devices via the Tor network.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-19210","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/19210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=19210"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/19210\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=19210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=19210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=19210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}