Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chaos Malware Variant Exploits Cloud Vulnerabilities

Chaos Malware Variant Exploits Cloud Vulnerabilities

Posted on April 8, 2026 By CWS

Cybersecurity experts have identified a new iteration of the Chaos malware, which now targets improperly configured cloud environments. This development represents a significant expansion of the botnet’s typical attack range, which previously focused on routers and edge devices.

Targeting Misconfigured Cloud Deployments

Chaos, initially documented by Lumen Black Lotus Labs in September 2022, is a versatile malware capable of operating on both Windows and Linux platforms. Its functionalities include executing remote shell commands, deploying additional modules, brute-forcing SSH keys, mining cryptocurrency, and launching DDoS attacks across various protocols such as HTTP, TLS, TCP, UDP, and WebSocket.

The malware is considered an evolution of the Kaiji DDoS malware, previously known for exploiting vulnerable Docker instances. Although the identities of the operators remain unknown, the presence of Chinese language elements and infrastructure suggests a possible Chinese origin.

New Variant and Its Methodology

Darktrace recently identified this new variant within its honeypot network through a misconfigured Hadoop instance that facilitates remote code execution. The attack began with an HTTP request aimed at the Hadoop deployment, which initiated the creation of a new application.

This application executed a series of shell commands to download a Chaos agent binary from a server controlled by the attackers, modify permissions to allow execution, and then remove the binary to reduce forensic evidence. The domain linked to this activity was previously involved in phishing campaigns orchestrated by the Chinese group Silver Fox, known as Operation Silk Lure.

Functional Changes and Implications

The 64-bit ELF binary of the Chaos variant has undergone restructuring and updates, while retaining most of its core features. Notably, it has removed functions for spreading via SSH and exploiting router vulnerabilities, replacing them with a new SOCKS proxy feature. This addition allows the compromised system to relay traffic, obscuring the origins of malicious activities and complicating detection efforts.

Darktrace also noted alterations in functions previously associated with Kaiji, indicating extensive refactoring or rewriting by the threat actors. The integration of the proxy feature suggests an intention to monetize the botnet further by offering diverse illicit services, beyond just cryptocurrency mining and DDoS attacks.

The continuous development of Chaos underscores the commitment of cybercriminals to enhance their tools and expand their botnets. The incorporation of proxy services in botnets like AISURU and Chaos signifies a shift in tactics, where denial-of-service attacks are just one of several threats posed to organizations and their security teams.

The Hacker News Tags:Botnet, Chaos malware, cloud security, Cryptomining, Cybercrime, Cybersecurity, DDoS, Malware, network security, SOCKS proxy

Post navigation

Previous Post: Zero-Day Exploit Threatens Adobe Reader Users
Next Post: Microsoft 365 Network Outage Affects Key Services

Related Posts

SolarWinds Fixes Major Flaws in Serv-U Software SolarWinds Fixes Major Flaws in Serv-U Software The Hacker News
Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists The Hacker News
Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar) Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar) The Hacker News
Veeam Fixes Critical Flaws in Backup Software Veeam Fixes Critical Flaws in Backup Software The Hacker News
CISA Flags VMware Vulnerability Amid Active Exploits CISA Flags VMware Vulnerability Amid Active Exploits The Hacker News
Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AWS and Anthropic Enhance AI Cybersecurity with Claude Mythos
  • Anthropic’s Claude Mythos Preview Revolutionizes Zero-Day Detection
  • Microsoft 365 Network Outage Affects Key Services
  • Chaos Malware Variant Exploits Cloud Vulnerabilities
  • Zero-Day Exploit Threatens Adobe Reader Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AWS and Anthropic Enhance AI Cybersecurity with Claude Mythos
  • Anthropic’s Claude Mythos Preview Revolutionizes Zero-Day Detection
  • Microsoft 365 Network Outage Affects Key Services
  • Chaos Malware Variant Exploits Cloud Vulnerabilities
  • Zero-Day Exploit Threatens Adobe Reader Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark