MySQL Servers have fallen victim to a DDoS malware

Hey, brace yourself for a wild ride in the cybersecurity world – it’s like hackers are throwing a sneaky party, and MySQL servers are the unsuspecting guests. So, here’s the lowdown: these crafty folks are on a mission, trying to form some shady club called a DDoS botnet by targeting those poor, vulnerable servers.

Our cyber heroes at AhnLab Security Emergency Response Center (ASEC) stumbled upon this whole drama during their usual database server threat watch. Picture this – hackers out there scouring the vast internet for MySQL servers, and they’ve got not one but two tricks up their sleeves.

First, they’re like the locksmiths of the dark web, trying to exploit the weak spots in servers that haven’t seen a patch in ages. But that’s not the only game in town; they’re also playing the brute force card. Imagine this: some MySQL spots have these weak passwords, and these hackers are basically winning the password guessing game and strolling right in.

Now, the real devious move – they’re using something called User-Defined Functions (UDF), like a sneaky backdoor to run commands on the server. Crafty, right? These hackers are playing coding wizards, defining functions in fancy languages like C or C++, compiling them into a DLL – creating their own little bundle of mischief. And guess what this mischief does? It downloads the Ddostf malware, turning the device into a pawn in their botnet game.