CatDDOS Threat Groups Sharply Ramp Up DDoS Attacks

In attacks over the past three months, threat actors have exploited more than 80 vulnerabilities to accelerate distribution of the Mirai variant.

3 Min Read
"DDoS" on a central gear surrounded by other gears with security icons
Source: Aleksey Funtap via Alamy Stock Photo

Researchers have spotted a recent surge in activity involving a Mirai distributed denial-of-service (DDoS) botnet variant called CatDDoS.

The attacks have targeted organizations across multiple sectors and include cloud vendors, communication providers, construction companies, scientific and research entities, and educational institutions in the US, France, Germany, Brazil, and China.

Multiple Variants

The malware first surfaced last August and was a relatively prolific threat in September 2023. CatDDoS dropped largely out of sight in December, prompting researchers tracking the threat at China's QiAnXin XLab to assume the operators of the malware may have pulled its plug.

In a report issued this week, QiAnXin said its researchers have observed multiple gangs using CatDDoS variants during the past three months. The operators of the variants, which are being tracked under various names, including RebirthLTD, Komaru, and Cecilio Network, have so far exploited at least 80 different vulnerabilities in their new campaign, QiAnXin said.

"Our system has observed that CatDDoS-related gangs remain active," QiAnXin said in a blog post. "Additionally, the maximum number of targets has been observed to exceed 300+ per day."

The vulnerabilities being exploited under the CatDDoS umbrella affect dozens of products and technologies, including Apache ActiveMQ Servers, Apache Log4j, Cisco Linksys, Jenkins servers, and NetGear routers.

Many of the vulnerabilities are recent, meaning they were disclosed over the past year. But there are numerous others that CatDDoS threat actors are leveraging that are relatively old. Among them is CVE-2010-2506, a nearly 14-year-old vulnerability in Linksys firmware; CVE-2013-1599, a more than decade-old flaw in D-Link IP cameras; and CVE-2011-5010, a remote code execution vulnerability in Ctek SkySouters from 2011.

"We have not yet identified some vulnerabilities, but it may be a zero-day vulnerability based on the parameters of execution of the samples," QuAnXin said. "For example, 'skylab0day' and 'Cacti-n0day' are shown in the sample's running parameters," the company noted, pointing to CatDDoS-related telemetry that its researchers analyzed.

According to QuAnXin. CatDDoS actors have been compromising upward of 300 targets per day in the latest wave of attacks.

The CatDDoS variants that the security vendor has observed all appear to be based on source code that the authors of the original malware publicly released in December after a futile bid to get someone to buy it off them. "Though the different variants may be managed by different groups, there is little variation in the code, communication design, strings, decryption methods, etc.," QuAnXin said. "So we unified these variants into the CatDDoS-related gangs, even though they may not want to admit it."

A Potent Threat, as Always

DDoS malware and botnets remain a potent threat for organizations worldwide. Though many organizations have built substantial redundancies into their network infrastructure to accommodate sudden DDoS-related traffic spikes, threat actors have upped their game as well.

A recent report from Nexusguard showed threat actors have shifted their attack focus to individual computers and servers. These systems were the primary target in 92% of the DDoS attack attempts that Nexusguard spotted last year — up sharply from just 68% a year ago. The company attributed the shift in focus to new vulnerabilities in Windows systems and the availability of malware that made it easier for attacks to compromise these systems,

Significantly, though DDoS attack volumes dropped 55% in 2023, the size of individual attacks grew 233%. In many of these attacks, threat actors continued to rely on NTP amplification — a technique that massively boosts attack traffic. But increasingly, Nexusguard said, they also relied on other techniques such as DNS amplification and HTTPS flooding methods to boost attack traffic volumes.

About the Author

Jai Vijayan, Contributing Writer

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights