


The latest variants include some Mirai-based modules and exploits, including HTTP flooding and UDP flooding. Any successful connections are sent to the command and control (C2) server.Įarly BASHLITE variants used a single hardcoded IP address to connect to a C2 server, but new variants have been observed using Tor-based communications that allow them to change C2 servers as attacker-owned download servers are identified and blocked.Ĭommunicating via Internet Relay Chat, the botnet generates different kinds of DDoS attacks like TCP flooding by abusing TCP packet flags, holding TCP connections open, and bombarding a specific TCP or UDP port with a string of junk characters. Other attack vectors include scanning for open Telnet ports or performing brute force attacks on random IP addresses, using a built-in dictionary of common or default passwords and usernames. BASHLITE infects new devices in several ways, but the most common method is to leverage Metasploit modules or other exploits against vulnerable devices.
