Malware attacks on Linux routers in Japan have been confirmed by JPCERT/CC

The Japanese Computer Emergency Response Team Coordination Center (JPCERT/CC) recently confirmed malware attacks on routers in Japan, targeting Linux routers with a new Golang RAT known as GobRAT. In this article, we will delve into the methods used by the attacker to exploit public router WEBUIs, the multifunctional Loader Script used to deploy GobRAT, how GobRAT executes on the machine, and its various functions, including the 22 commands used by GobRAT to communicate with its C2 server.

Methodology and Steps of the GobRAT Attack

The attacker exploits publicly accessible router WEBUIs, leveraging potential vulnerabilities to infect them with the GobRAT. The first step in the attacker’s process is targeting a publicly accessible router with an open WEBUI, exploiting vulnerabilities through script execution, and ultimately installing the GobRAT malware.

The multifunctional loader encompasses tasks such as script generation and downloading GobRAT. Additionally, it contains a hard-coded SSH public key for the assumed backdoor. The Loader Script disguises itself as the Apache daemon process (apached) to avoid being detected, making GobRAT downloading easier.

The Start Script is responsible for executing GobRAT and distinguishes itself by recording the startup time in a file called restart[.]log, while also running GobRAT under the guise of a legitimate process named apached. The script runs at regular intervals and ensures that GobRAT is up and running without interruption, while also keeping track of its execution and startup times.

The Status Monitoring Script is a daemon that checks the status of the Start Script every 20 seconds and ensures the continuous operation of the GobRAT payload. With this script, the attacker can guarantee uninterrupted operation of the GobRAT ransomware.

TLS Communication for Data Transfer

GobRAT utilizes TLS for data communication with the C2 server. The encryption mechanism provides confidentiality, integrity, and authenticity. This means that the attacker can easily transmit sensitive and confidential data over the network without any risk of interception or tampering by network attackers.

GobRAT utilizes 22 commands from the C2 server, which are grouped into communication functions such as frpc, socks5, and C2 reconfiguration. For instance, the frpc function allows the malware to bind to a specific port to receive data from the command-and-control center, facilitating communication between the C2 server and GobRAT malware.

In conclusion, GobRAT is a new RAT that is actively being used in Japan to target Linux routers. We have discussed the methodology and stages of the GobRAT attack, including the multifunctional Loader Script, Start Script, and Daemon Script. It is highly advisable to keep routers updated with the latest security patches and configurations to prevent cyber attacks of any kind.

Explore more

Hotels Must Rethink Recruitment to Attract Top Talent

With decades of experience guiding organizations through technological and cultural transformations, HRTech expert Ling-Yi Tsai has become a vital voice in the conversation around modern talent strategy. Specializing in the integration of analytics and technology across the entire employee lifecycle, she offers a sharp, data-driven perspective on why the hospitality industry’s traditional recruitment models are failing and what it takes

Trend Analysis: AI Disruption in Hiring

In a profound paradox of the modern era, the very artificial intelligence designed to connect and streamline our world is now systematically eroding the foundational trust of the hiring process. The advent of powerful generative AI has rendered traditional application materials, such as resumes and cover letters, into increasingly unreliable artifacts, compelling a fundamental and costly overhaul of recruitment methodologies.

Is AI Sparking a Hiring Race to the Bottom?

Submitting over 900 job applications only to face a wall of algorithmic silence has become an unsettlingly common narrative in the modern professional’s quest for employment. This staggering volume, once a sign of extreme dedication, now highlights a fundamental shift in the hiring landscape. The proliferation of Artificial Intelligence in recruitment, designed to streamline and simplify the process, has instead

Is Intel About to Reclaim the Laptop Crown?

A recently surfaced benchmark report has sent tremors through the tech industry, suggesting the long-established narrative of AMD’s mobile CPU dominance might be on the verge of a dramatic rewrite. For several product generations, the market has followed a predictable script: AMD’s Ryzen processors set the bar for performance and efficiency, while Intel worked diligently to close the gap. Now,

Trend Analysis: Hybrid Chiplet Processors

The long-reigning era of the monolithic chip, where a processor’s entire identity was etched into a single piece of silicon, is definitively drawing to a close, making way for a future built on modular, interconnected components. This fundamental shift toward hybrid chiplet technology represents more than just a new design philosophy; it is the industry’s strategic answer to the slowing