A threat actor known as Matrix has been linked to a large-scale distributed denial-of-service (DDoS) campaign targeting vulnerabilities and misconfigurations in Internet of Things (IoT) devices. These compromised devices are co-opted into a botnet, creating widespread disruption.
Attack Highlights
According to Assaf Morag, director of threat intelligence at cloud security firm Aqua:
“This operation serves as a comprehensive one-stop shop for scanning, exploiting vulnerabilities, deploying malware, and setting up shop kits, showcasing a do-it-all-yourself approach to cyberattacks.”
Key Observations:
Attack Methods
The Matrix botnet exploits:
The botnet leverages widely available scripts and tools from platforms like GitHub, deploying:
Matrix's Activities
Matrix’s operations include maintaining a GitHub account (established in November 2023) to distribute DDoS artifacts. The botnet is also advertised as a DDoS-for-hire service via a Telegram bot called "Kraken Autobuy", offering attack tiers in exchange for cryptocurrency payments.
“This campaign, while not highly sophisticated, demonstrates how accessible tools and basic technical knowledge can enable individuals to execute broad, multi-faceted attacks,” said Morag.
Prevention Tips
To mitigate risks from campaigns like Matrix:
Related Developments
The disclosure coincides with findings about XorBot, a botnet targeting Intelbras cameras and routers from NETGEAR, TP-Link, and D-Link since November 2023. The botnet, marketed as Masjesu, uses techniques like code obfuscation and signature manipulation to evade detection while offering DDoS rental services.
These developments underline the growing accessibility of DDoS tools, reinforcing the need for fundamental security practices to prevent exploitation.
© 2016 - 2025 Red Secure Tech Ltd. Registered in England and Wales under Company Number: 15581067