Two botnets have been attempting to infect victims globally by exploiting vulnerabilities in modems, routers, and IoT devices. These botnets, identified as Enemybot and Fodcha, are capable of carrying out DDoS attacks.
About Enemybot
The Mirai-based botnet, Enemybot has been growing its fleet of infected devices using witty tricks.
In its initial states of infection, Enemybot drops a message in a file claiming its attributions to the Keksec group.
Enemybot comes with string obfuscation while its C2 server hides behind Tor nodes making it challenging to control its movement.
Fodcha botnet has been targeting routers, DVRs, and servers to infect more than 100 victims every single day in DDoS attacks.
This botnet has already spread to over 62,000 devices (having unique IPs) between March 29 and April 10, and the daily active bots under its control fluctuate from 10,000 to 56,000 devices.
Most bots are found using the services belonging to China Unicom (59.9%) and China Telecom (39.4%).
The recent botnet attacks show the growing problem of unpatched devices and services in a network. The best and most basic way to stop/avoid such attacks is to patch any exploitable vulnerabilities. Further, you can also perform a manual hard reset and change the password of the infected device.