{"id":172614,"date":"2023-09-23T05:24:55","date_gmt":"2023-09-23T10:24:55","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/09\/p2pinfect-botnet-activity-surges-600x-with-stealthier-malware-variants"},"modified":"2023-09-23T05:24:55","modified_gmt":"2023-09-23T10:24:55","slug":"p2pinfect-botnet-activity-surges-600x-with-stealthier-malware-variants","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/09\/p2pinfect-botnet-activity-surges-600x-with-stealthier-malware-variants","title":{"rendered":"P2PInfect botnet activity surges 600x with stealthier malware variants"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/p2pinfect-botnet-activity-surges-600x-with-stealthier-malware-variants2.jpg\"><\/a><\/p>\n<p>The P2PInfect botnet worm is going through a period of highly elevated activity volumes starting in late August and then picking up again in September 2023.<\/p>\n<p>P2PInfect was first documented by <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-p2pinfect-worm-malware-targets-linux-and-windows-redis-servers\/\" target=\"_blank\">Unit 42<\/a> in July 2023 as a peer-to-peer malware that breaches Redis instances using a remote code execution flaw on internet-exposed Windows and Linux systems.<\/p>\n<p>Cado Security researchers who have been following the botnet <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/p2pinfect-server-botnet-spreads-using-redis-replication-feature\/\" target=\"_blank\">since late July 2023<\/a>, report today seeing global activity, with most breaches impacting systems in China, the United States, Germany, Singapore, Hong Kong, the UK, and Japan.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The P2PInfect botnet worm is going through a period of highly elevated activity volumes starting in late August and then picking up again in September 2023. P2PInfect was first documented by Unit 42 in July 2023 as a peer-to-peer malware that breaches Redis instances using a remote code execution flaw on internet-exposed Windows and Linux [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418],"tags":[],"class_list":["post-172614","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/172614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=172614"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/172614\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=172614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=172614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=172614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}