• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Computer security data security Linux security Mac security Windows security

RapperBot malware targeting game servers via DDOS attacks

John Greenwood Posted On November 17, 2022
0



RapperBot malware

A malware linked to Mirai has re-emerged as ‘RapperBot’ in a new campaign that targets IoT devices for DDOS attacks on Game Servers. The Fortinet has discovered this RapperBot malware in August when the malware started using SSH brute-force to  distribute Linux servers.

After tracking the activities, the researchers have found that the RapperBot malware is active since May 2021, but the motive is hard to figure out. The recent variant is found to be using self-propagation mechanism just like the original Mirai-botnet malware.

Also, the DOS command in this latest RapperBot malware are tailored for attacks against game servers.

Diving deep into the RapperBot malware

As per the Fortinet analysis the latest variant is using C2 communication, and has some new variations including support for Telnet brute-forcing by following the below commands,

  • Register
  • Keep-alive
  • Hold DOS attacks & terminate client
  • Execute a DOS attack
  • Stop all DOS attacks
  • Resume Telnet brute forcing
  • Stop Telnet brute forcing
Source: Fortinet

The RapperBot malware brute force device using weak credentials from a hardcoded list as per the data from the C2.

“To optimize brute forcing efforts, the malware compares the server prompt upon connection to a hardcoded list of strings to identify the possible device and then only tries the known credentials for that device,”Unlike less sophisticated IoT malware, this allows the malware to avoid trying to test a full list of credentials.”said Fortinet in their report.

Once the RapperBot malware marks the credentials, it reports the same to the C2 via 5123 port and then installs the latest payload binary on the device. RapperBot malware currently supports MIPS, PowerPC, SH4 and SPARC.

The RapperBot malware’s old version had limited DOS capabilities but the latest variant comes extensive DOS commands including TCP SYN flood, Generic UDP flood, GRE Ethernet flood, UDP SA: MP flood targeting GTA game servers, TCP ACK flood, GRE IP flood, Generic TCP flood, and TCP STOMP flood.

The RapperBot malware has techniques and capabilities to target game servers, as it add DOS attacks against the UDP and GRE protocol used by GTA SanAndreas MP mod.

RapperBot malware operated  by the same entities

Fortinet believe the RapperBot malware and its campaign is created, maintained and operated by the same entities with similarity in source codes including C2 communication.

If you want to keep your IoT devices safe against RapperBot malware, keep the firmware updated, modify your credentials periodically with a strong password practices, and employ a strong firewall.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends


CyberattackCybersecuritydata securityDDOS attack


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
Top 9 Best Log Management Tools for 2025
September 20, 2025
Top 4 Remote Support Tools for 2025- Best Remote Support Solution
September 18, 2025
Top 5 Best Unified Endpoint Management (UEM) Software for 2025
September 12, 2025
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search