Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0220

Chaos

Type

Botnet / Remote Access Trojan (RAT)

Associated threat actors

Various

Key Capabilities

Compromises systems to absorb them into a botnet. Runs remote commands, steals SSH keys, and launches DDoS attacks.

OS Targeted

Windows and Linux

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is Chaos?

Chaos malware (S0220) is a cross-platform botnet written in Go that targets both Windows and Linux systems. It spreads by exploiting known vulnerabilities and conducting SSH brute force attacks (SSH is an abbreviation for Secure Shell, a protected way to control computers remotely).

Once infected, a system is absorbed into the botnet. The malware can then receive commands from an operator to launch DDoS attacks, steal SSH keys for lateral movement, or establish a reverse shell, giving its controllers remote access to the infected machine.

How to Defend Against Chaos?

Defending against the Chaos malware requires hardening systems against its initial access methods and detecting its botnet activity.

  • Use strong, unique SSH credentials and consider key-based authentication to protect against SSH brute force attacks.
  • Keep all systems patched to close the known vulnerabilities that the malware actively exploits to spread.
  • Deploy endpoint detection and antivirus solutions to identify and block the malware’s execution on both Windows and Linux devices.
  • Use network detection (NDR) with integrated threat intelligence to spot and block C2 communications and outgoing DDoS traffic.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.