New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,抓住主要内容。 文章讲的是一个新的恶意软件变种Chaos,它能够攻击配置错误的云部署。这扩展了它之前针对路由器和边缘设备的目标。Darktrace报告中提到Chaos是从Kaiji演变而来的,后者专门攻击配置错误的Docker实例。目前还不清楚谁在背后操作,但有迹象显示可能来自中国。 攻击中使用了Hadoop实例,并通过HTTP请求植入恶意软件,设置权限并执行二进制文件。此外,Chaos添加了SOCKS代理功能,用于隐藏恶意活动的来源,并可能扩展其牟利方式。 总结时要包括:Chaos的新变种、攻击云部署、来自Kaiji的演变、可能的中国背景、SOCKS代理功能以及扩展牟利方式。确保在100字以内简洁明了地表达这些要点。 </think> 新的恶意软件变种Chaos能够攻击配置错误的云部署,扩展了其针对路由器和边缘设备的传统目标。该恶意软件从Kaiji演变而来,可能与中国相关联。攻击利用Hadoop实例植入恶意软件,并添加SOCKS代理功能以隐藏来源,可能进一步扩展牟利方式。 2026-4-8 17:51:0 Author: thehackernews.com(查看原文) 阅读量:8 收藏

Cryptomining / Network Security

Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat'scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet's targeting infrastructure.

"Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices," Darktrace said in a new report.

Chaos was first documented by Lumen Black Lotus Labs in September 2022, describing it as a cross-platform malware capable of targeting Windows and Linux environments to run remote shell commands, drop additional modules, propagate to other hosts by brute-forcing SSH keys, mine cryptocurrency, and launch distributed denial-of-service (DDoS) attacks via HTTP, TLS, TCP, UDP, and WebSocket.

The malware is assessed to be an evolution of another DDoS malware known as Kaiji that has singled out misconfigured Docker instances.It's currently not known who is behind the operation, but the presence of Chinese language characters and the use of China-based infrastructure suggest that the threat actor could be of Chinese origin.

Darktrace said it identified the new variant targeting its honeypot network last month, a deliberately misconfigured Hadoop instance that enables remote code execution on the service. In the attack spotted by the cybersecurity company, the intrusion commenced with an HTTP request to the Hadoop deployment to create a new application.

The application, for its part, embedded a sequence of shell commands to retrieve a Chaos agent binary from an attacker-controlled server ("pan.tenire[.]com"), set permissions to allow all users to read, modify, or run it ("chmod 777"), and then actually execute the binary and delete the artifact from disk to minimize the forensic trail.

An interesting aspect of the attack is that the domain was previously put to use in connection with an email phishing campaign carried out by the Chinese cybercrime group Silver Fox to deliver decoy documents and ValleyRAT malware. The campaign was codenamed Operation Silk Lure by Seqrite Labs in October 2025.

The 64-bit ELF binary is a restructured and updated version of Chaos that reworks several of its functions, while keeping most of its core feature set intact. One of the more significant changes, however, concerns the removal of functions that enabled it to spread via SSH and exploit router vulnerabilities.

Taking their place is a new SOCKS proxy feature that allows the compromised system to be used for ferrying traffic, thereby concealing the true origins of malicious activity and making it harder for defenders to detect and block the attack.

"In addition, several functions that were previously believed to be inherited from Kaiji have also been changed, suggesting that the threat actors have either rewritten the malware or refactored it extensively," Darktrace added.

The addition of the proxy feature is likely a sign that threat actors behind the malware are lookingto further monetize the botnet beyond cryptocurrency mining and DDoS-for-hire, and keep up with their competitors in the cybercrime market by offering a diverse slate of illicit services.

"While Chaos is not a new malware, its continued evolution highlights the dedication of cybercriminals to expand their botnets and enhance the capabilities at their disposal," Darktrace concluded. "The recent shift in botnets such as AISURU and Chaos to include proxy services as core features demonstrates that denial-of-service is no longer the only risk these botnets pose to organizations and their security teams."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/new-chaos-variant-targets-misconfigured.html
如有侵权请联系:admin#unsafe.sh