

Critical PHP RCE Vulnerability Under Mass Exploitation in New Attacks
March 12, 2025
RedLine Stealer – Active IOCs
March 13, 2025
Critical PHP RCE Vulnerability Under Mass Exploitation in New Attacks
March 12, 2025
RedLine Stealer – Active IOCs
March 13, 2025Severity
High
Analysis Summary
Gafgyt is a type of malware that is used to conduct Distributed Denial of Service (DDoS) attacks. These attacks involve overwhelming a targeted website or server with a large amount of traffic to disrupt its normal functioning. Gafgyt malware is typically spread through phishing emails or by exploiting vulnerabilities in poorly secured Internet of Things (IoT) devices, such as routers and cameras. Once a device is infected, it can be controlled remotely by the attackers and used as part of a botnet to launch DDoS attacks. These botnets can be used to target websites or servers, and they have been used to disrupt a wide range of online services in the past. The TTPs (Tactics, Techniques, and Procedures) used by Gafgyt malware include:
- Exploiting vulnerabilities: Gafgyt malware is often spread by exploiting known vulnerabilities in IoT devices, such as routers and cameras.
- Phishing emails: Gafgyt malware can also be spread through phishing emails that contain malicious links or attachments.
- Botnet: Once a device is infected, it becomes part of a botnet controlled by the attackers, which is used to launch DDoS attacks.
- DDoS attacks: This malware is primarily used to conduct DDoS attacks, which involve overwhelming a targeted website or server with a large amount of traffic to disrupt its normal functioning.
- Evasion: The malware is also known to have an advanced evasion technique, which allows it to avoid detection by security software.
- Reconnaissance: Gafgyt malware also can scan the network and identify other vulnerable devices that can be infected and added to the botnet.
The malware is known to be modular, which allows attackers to add new capabilities to the malware as needed. This makes it a versatile threat that can be used for a wide range of attacks. Organizations should be aware of the threat posed by Gafgyt malware and take appropriate measures to protect their networks from DDoS attacks, such as implementing DDoS mitigation solutions.
Impact
- Server Outage
- Data Loss
- Website Downtime
Indicators of Compromise
MD5
eb42ee555ebf42f139c96ad81d705b73
148e77af7a6fa5e13ce55b2cef65bf2c
c9c8e3a940d9293a5bcf4241b243cd35
81349e42618a34ec849cf5b6853a3901
c0de37528a7f4a8b00de3f7c5c4b0168
SHA-256
882bdf2ec89386bdaf21e2c1298ef40586fc7a3ae2996721ebe531a34f7ce737
9c049e717a8dae4ed82c71464cc1b49cb0ea8aec0396ccd58d09d6025f716676
99089a8788583ce41d984cbac7d2c5cc75bb73ba201868e40a5b12fa6eb1c2c0
14217a50150f55e95a07a6ef6e0375b2de9f0baf792db277beaf821188229525
4afd9a9e8790ee1a3530ebf27d694e2ce2a7b9e7df16c9633512dca05e6761f4
SHA-1
29dd172fa6d8eca7f6d96c4e3f81559974c9a26f
0caede6723a0aeda3001d9aee70e3763bac335db
4b707703bdb1350a462539666a2596f463240d1c
d8369f79b3ae16b68cc608f072a122ea51f20e30
c1d501e4aa0e14f5c576d35c4eecf5e2acae4284
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Upgrade your operating system.
- Don't open files and links from unknown sources.
- Install and run anti-virus scans.