{"id":45243,"date":"2026-04-09T05:50:55","date_gmt":"2026-04-08T21:50:55","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy\/"},"modified":"2026-04-09T05:50:55","modified_gmt":"2026-04-08T21:50:55","slug":"new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy\/","title":{"rendered":"New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgjO6ntnqBUePhV2XQEQmTFh-IjdPR64u_T9ODhO3RY_BAv_8YohhRCwMg6OO9UKlvJJCd7rs1c391fbNZ59qDsSujaFJuso3h_94xKo2BX2L5Jj-osBqZ3VglM5kbgzt6OJGtkiNx4Am6NbgzrHtUa7fbdnfei8_xeJao4yvlMp3HkCurz9aNJkg9Xv934\/s1600\/cloud.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgjO6ntnqBUePhV2XQEQmTFh-IjdPR64u_T9ODhO3RY_BAv_8YohhRCwMg6OO9UKlvJJCd7rs1c391fbNZ59qDsSujaFJuso3h_94xKo2BX2L5Jj-osBqZ3VglM5kbgzt6OJGtkiNx4Am6NbgzrHtUa7fbdnfei8_xeJao4yvlMp3HkCurz9aNJkg9Xv934\/s1600\/cloud.jpg\" alt=\"New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy\"\/><\/a><\/div>\n<p>Cybersecurity researchers have flagged a new variant&nbsp;ofmalware&nbsp;called <strong>Chaos<\/strong>that&#8217;scapable of&nbsp;hitting misconfigured cloud deployments, marking an expansion of the botnet&#8217;s targeting infrastructure.<\/p>\n<p>&#8220;Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices,&#8221;&nbsp;Darktrace <a href=\"https:\/\/www.darktrace.com\/blog\/darktrace-identifies-new-chaos-malware-variant-exploiting-misconfigurations-in-the-cloud\">said<\/a> in a new&nbsp;report.<\/p>\n<p>Chaos&nbsp;was <a href=\"https:\/\/thehackernews.com\/2022\/09\/researchers-warn-of-new-go-based.html\">first documented<\/a> by Lumen Black Lotus Labs in September 2022, describing it as a cross-platform malware capable of targeting Windows and Linux environments to run remote shell commands, drop additional modules, propagate to other hosts by brute-forcing SSH keys, mine cryptocurrency, and launch distributed denial-of-service (DDoS) attacks via HTTP, TLS, TCP, UDP, and WebSocket.<\/p>\n<p>The&nbsp;malware is&nbsp;assessed to be an evolution of another DDoS malware known&nbsp;as <a href=\"https:\/\/thehackernews.com\/2025\/12\/react2shell-exploitation-delivers.html\">Kaiji<\/a>&nbsp;that&nbsp;has singled&nbsp;out misconfigured Docker instances.It&#8217;s&nbsp;currently not&nbsp;known who is behind the operation, but the presence of&nbsp;Chinese language characters and the use of China-based infrastructure&nbsp;suggest&nbsp;that the threat actor could be of Chinese&nbsp;origin.<\/p>\n<p> <a name=\"more\"><\/a> <\/p>\n<p>Darktrace said it identified the new variant targeting its honeypot network last month, a deliberately misconfigured Hadoop instance that enables remote code execution on the service. In&nbsp;the attack spotted by the cybersecurity company, the intrusion commenced with an HTTP request to the Hadoop deployment to create a new application.<\/p>\n<p>The application, for its part, embedded a sequence of shell commands to retrieve a Chaos agent binary from an attacker-controlled server (&#8220;pan.tenire[.]com&#8221;), set permissions to allow all users to read, modify, or run it (&#8220;chmod 777&#8221;), and then actually execute the binary and delete the artifact from disk to minimize the forensic&nbsp;trail.<\/p>\n<p>An&nbsp;interesting aspect of the attack is that the domain was previously put to&nbsp;use&nbsp;in connection&nbsp;with an email phishing campaign carried out by the Chinese cybercrime group Silver Fox to deliver decoy documents and ValleyRAT&nbsp;malware. The&nbsp;campaign was&nbsp;codenamed <a href=\"https:\/\/thehackernews.com\/2025\/10\/silver-fox-expands-winos-40-attacks-to.html#operation-silk-lure-targets-china-with-valleyrat\">Operation Silk&nbsp;Lure<\/a> by Seqrite Labs in October&nbsp;2025.<\/p>\n<p>The&nbsp;64-bit ELF binary is a restructured and updated version of Chaos that reworks&nbsp;several of&nbsp;its&nbsp;functions, while keeping most of its core feature set&nbsp;intact. One&nbsp;of the more significant changes, however, concerns the removal of functions that enabled it to spread via SSH and exploit router vulnerabilities.<\/p>\n<p>Taking&nbsp;their place is a new SOCKS proxy feature that allows the compromised system&nbsp;to be used for&nbsp;ferrying traffic, thereby concealing the true origins of malicious activity and making it harder for defenders to detect and block the&nbsp;attack.<\/p>\n<p>&#8220;In addition, several functions&nbsp;that were previously&nbsp;believed&nbsp;to be&nbsp;inherited from Kaiji have&nbsp;also been&nbsp;changed, suggesting that the threat actors have either rewritten the malware or refactored it extensively,&#8221; Darktrace&nbsp;added.<\/p>\n<p>The&nbsp;addition of the proxy feature is likely a sign that threat actors behind the malware&nbsp;are lookingto further monetize the botnet beyond cryptocurrency mining&nbsp;and <a href=\"https:\/\/thehackernews.com\/2026\/04\/masjesu-botnet-emerges-as-ddos-for-hire.html\">DDoS-for-hire<\/a>, and&nbsp;keep up&nbsp;with their competitors in the cybercrime market by offering a diverse slate of illicit&nbsp;services.<\/p>\n<p>&#8220;While Chaos is not a new malware, its continued evolution highlights the dedication of cybercriminals to expand their botnets and enhance the capabilities at their disposal,&#8221; Darktrace concluded. &#8220;The recent shift in botnets such&nbsp;as <a href=\"https:\/\/thehackernews.com\/2026\/03\/doj-disrupts-3-million-device-iot.html\">AISURU<\/a> and Chaos to include proxy services as core features demonstrates that denial-of-service is no longer the only risk these botnets pose to organizations and their security&nbsp;teams.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have flagged a new variant&nbsp;ofmalware&nbsp;called Chaosthat&#8217;scapable of&nbsp;hitting misconfigured cloud deployments, marking an expansion of the botnet&#8217;s targeting infrastructure.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45243","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45243"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45243\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}