RapperBot Malware Used to Launch DDoS Attacks on Game Servers

A new version of botnet malware RapperBot is being used to target game servers with DDoS attacks. IoT devices are being used as gateways to reach the servers.

Game Servers Targeted by DDoS Attackers

Threat actors are using RapperBot malware to carry out distributeddenial-of-service (DDoS)attacks on game servers. Linux platforms are at risk of attacks by this highly dangerous botnet.

In aFortinet blog post, it was stated that RapperBot is likely being aimed at game servers due to the specific commands it supports and the lack of absence of HTTP-related DDoS attacks.IoT (Internet of Things)devices are at risk here, though it seems that RapperBot is more concerned with targeting older devices equipped with the Qualcomm MDM9625 chipset.

4

RapperBot looks to be targeting devices running on ARM, MIPS, PowerPC, SH4, and SPARC architectures, though it is not designed to run on Intel chipsets.

This Is Not RapperBot’s Debut

RapperBot is not brand new to the cybercrime space, though it hasn’t been around for years, either. RapperBot was first noticed in the wild in August 2022 by Fortinet, though it has since been confirmed that it has been in operation since May of the previous year. In this instance, RapperBot was being used to launch SSHbrute-force attacksto propagate on Linux servers.

Fortinet stated in the aforementioned blog post that the most significant difference in this updated version of RapperBot is “the complete replacement of the SSH brute forcing code with the more usual Telnet equivalent”.

xbox controller in hands

This Telnet code is designed for self-propagation, which closely resembles and may be inspired by the old Mirai IoT botnet that runs on ARC processors. The Mirai source code leaked in late 2016, which led to the creation of numerous modified versions (one of which may be RapperBot).

But unlike Mirai, this iteration of RapperBot’s embedded binary downloaders are “stored as escaped byte strings, probably to simplify parsing and processing within the code”, as stated in the Fortinet blog post regarding the new version of the botnet.

security sign with a lock

Botnet’s Operators Are Not Known

At the time of writing, RapperBot’s operators remain anonymous. However, Fortinet did state that a single malicious actor or group of actors with access to the source code are the most likely scenarios. More information on this may come out in the near future.

It is also likely that this updated version of RapperBot is likely being used by the same individuals who operated the previous iteration, as they would need access to the source code to carry out attacks.

BBC iPlayer showing on a smart TV.

RapperBot’s Activity Continues to Be Monitored

Fortinet ended its blog post regarding the updated RapperBot variant by assuring readers that the malware’s activity will be monitored in the future. So, we may continue to see more instances of RapperBot’s use as time passes.

Has your website been a victim of a Distributed Denial of Service attack? It could be a result of DDoS-for-Hire.

Apple’s Siri assistant on an iPhone 16 Pro

Unlock a world of entertainment possibilities with this clever TV hack.

When your rival has to bail out your assistant.

Anyone with more than a passing interest in motorsports must see these films.

Your phone’s camera app doesn’t show this, so it’s easy to miss.

Tor spoiled me forever.

Technology Explained

PC & Mobile