Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Value-Driven AI Roadmap

      September 9, 2025

      This week in AI updates: Mistral’s new Le Chat features, ChatGPT updates, and more (September 5, 2025)

      September 6, 2025

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025

      As Windows 10 support ends, users weigh costly extended security program against upgrading to Windows 11

      September 10, 2025

      Lenovo’s Legion Glasses 2 update could change handheld gaming

      September 10, 2025

      Is Lenovo’s refreshed LOQ tower enough to compete? New OLED monitors raise the stakes at IFA 2025

      September 10, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      External Forces Reshaping Financial Services in 2025 and Beyond

      September 10, 2025
      Recent

      External Forces Reshaping Financial Services in 2025 and Beyond

      September 10, 2025

      Why It’s Time to Move from SharePoint On-Premises to SharePoint Online

      September 10, 2025

      Apple’s Big Move: The Future of Mobile

      September 10, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025
      Recent

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025

      As Windows 10 support ends, users weigh costly extended security program against upgrading to Windows 11

      September 10, 2025

      Lenovo’s Legion Glasses 2 update could change handheld gaming

      September 10, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»New Linux Botnet Combines Cryptomining and DDoS Attacks

    New Linux Botnet Combines Cryptomining and DDoS Attacks

    September 10, 2025

    LunoC2 Linux botnet DDoS cryptominer

    Cyble threat intelligence researchers have identified a sophisticated Linux botnet built for cryptocurrency mining, remote command execution, and dozens of DDoS attack types.

    Cyble Research and Intelligence Labs (CRIL) researchers have dubbed the campaign “Luno.” The malware also includes strong obfuscation and evasion features, “indicating active professional threat actor involvement,” the researchers wrote in a blog post.

    “Unlike conventional cryptominers or DDoS botnets, LunoC2 exhibits process masquerading, binary replacement, and a self-update system, suggesting the malware is designed as a long-term criminal infrastructure tool,” they said.

    Linux Botnet Actor Selling DDoS Services

    Cyble said that while the threat actors behind the malware are unknown, the Luno actor is actively selling DDoS services on a Telegram channel that was created in late July.

    LunoC2’s architecture and pricing model “suggest intent for long-term monetization and operational flexibility,” Cyble said.

    DDoS features include tunable parameters such as target, method, time, and threads, with explicit target routines for Roblox, Minecraft, and Valve servers, suggesting a botnet-for-hire model, they said.

    The malware downloads the xmrig miner from main[.]botnet[.]world and saves it as /bin/ash. The replacement of the legitimate ash shell (Almquist Shell) commonly found in embedded Linux distributions “suggests that the malware is specifically targeting resource-constrained systems for cryptocurrency mining, where ash is the default shell,” Cyble said.

    Anti-analysis features include debugger/tracer detection, tool detection, network Interface detection that checks NIC interfaces for anomalies, and timing checks to detect execution delay. “It does this by inspecting the execution environment,” the researchers said. “If an anomaly is detected, it attempts to self-delete itself from disk.”

    Luno’s Sophisticated DDoS Capabilities

    DDoS_attack_launcher contains the core DDoS capabilities, enabling both thread-based floods and external binary execution. Cyble identified more than 20 different DDoS attack modules and types.

    Attacks like udp-bypass and tcp-bypass are more advanced than standard volumetric floods, allowing the attacker to randomize the packet size and destination port to evade basic signature-based detection rules.

    An HTTP GET flood attack function simulates real browser traffic with randomized headers, using a hardcoded list of random user-agents with 102 legitimate referrers “that mimic human browsing diversity and evade basic detections.”

    The malware targets game servers with Minecraft-specific DDoS attack functions, Valorant-specific QUIC packets, and RakNet engine components used by many gaming engines for multiplayer functionality, the researchers said.

    The malware’s RakNet command uses the RakNet protocol handshake to bypass any simple firewall rules or rate-limiting that block untrusted, non-protocol UDP traffic. “By completing the handshake, the attacker makes the traffic look legitimate to the server, causing the server to waste resources processing the flood of incoming packets,” Cyble said.

    The more advanced raknet-mix command “floods the target using a variety of randomized packets to make its traffic look more diverse and difficult to block with a single rule.”

    Cyble said the malware is built to be a long-term threat, and defenders should take note.

    “Given its resilience, modularity, monetization potential, resource theft, and service disruption capabilities, all of which possess operational and financial risks for organizations, defenders should treat LunoC2 as a long-term threat to Linux environments, particularly internet-facing servers and game-hosting platforms,” the researchers concluded.

    The full Cyble blog takes an in-depth look at the malware and also includes indicators of compromise (IoCs) and recommendations for defenders.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMicrosoft Patch Tuesday September 2025 Fixes Risky Kernel Flaws
    Next Article Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

    Related Posts

    Development

    How AI is Redefining Traditional GCC Cost Models for Peak Efficiency

    September 10, 2025
    Development

    How to Automate API Documentation Updates with GitHub Actions and OpenAPI Specifications

    September 10, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2024-43018 – Piwigo SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    This freaky Lovecraftian horror FPS is coming to Xbox and PS5, with a demo on Steam now — the devs said “you never know” about Game Pass, too

    News & Updates

    I saw Resident Evil Requiem gameplay, and Capcom is cooking up some impressive horror

    News & Updates

    CVE-2025-53003 – Janssen Project IAM Unverified Scope Information Disclosure

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Alert: Malicious RubyGems Impersonate Fastlane Plugins, Steal CI/CD Data

    June 3, 2025

    Alert: Malicious RubyGems Impersonate Fastlane Plugins, Steal CI/CD Data

    Socket’s Threat Research Team has uncovered a targeted supply chain attack leveraging malicious RubyGems impersonating Fastlane plugins. The attackers exploited heightened demand for Telegram workarou …
    Read more

    Published Date:
    Jun 04, 2025 (3 hours, 13 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2023-22794

    CVE-2021-33621

    CISA Warns of Critical Vulnerabilities in Planet Technology Products

    April 28, 2025

    Think Before You Download: UAE Cybersecurity Council Issues Warning on Unverified Apps

    August 5, 2025

    ChatGPT will apologize for anything

    August 8, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.