New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
The Hacker NewsArchived Apr 08, 2026✓ Full text saved
Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat'scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet's targeting infrastructure. "Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices," Darktrace said in a new report.
Full text archived locally
✦ AI Summary· Claude Sonnet
New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
Ravie LakshmananApr 08, 2026Cryptomining / Network Security
Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat'scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet's targeting infrastructure.
"Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices," Darktrace said in a new report.
Chaos was first documented by Lumen Black Lotus Labs in September 2022, describing it as a cross-platform malware capable of targeting Windows and Linux environments to run remote shell commands, drop additional modules, propagate to other hosts by brute-forcing SSH keys, mine cryptocurrency, and launch distributed denial-of-service (DDoS) attacks via HTTP, TLS, TCP, UDP, and WebSocket.
The malware is assessed to be an evolution of another DDoS malware known as Kaiji that has singled out misconfigured Docker instances.It's currently not known who is behind the operation, but the presence of Chinese language characters and the use of China-based infrastructure suggest that the threat actor could be of Chinese origin.
Darktrace said it identified the new variant targeting its honeypot network last month, a deliberately misconfigured Hadoop instance that enables remote code execution on the service. In the attack spotted by the cybersecurity company, the intrusion commenced with an HTTP request to the Hadoop deployment to create a new application.
The application, for its part, embedded a sequence of shell commands to retrieve a Chaos agent binary from an attacker-controlled server ("pan.tenire[.]com"), set permissions to allow all users to read, modify, or run it ("chmod 777"), and then actually execute the binary and delete the artifact from disk to minimize the forensic trail.
An interesting aspect of the attack is that the domain was previously put to use in connection with an email phishing campaign carried out by the Chinese cybercrime group Silver Fox to deliver decoy documents and ValleyRAT malware. The campaign was codenamed Operation Silk Lure by Seqrite Labs in October 2025.
The 64-bit ELF binary is a restructured and updated version of Chaos that reworks several of its functions, while keeping most of its core feature set intact. One of the more significant changes, however, concerns the removal of functions that enabled it to spread via SSH and exploit router vulnerabilities.
Taking their place is a new SOCKS proxy feature that allows the compromised system to be used for ferrying traffic, thereby concealing the true origins of malicious activity and making it harder for defenders to detect and block the attack.
"In addition, several functions that were previously believed to be inherited from Kaiji have also been changed, suggesting that the threat actors have either rewritten the malware or refactored it extensively," Darktrace added.
The addition of the proxy feature is likely a sign that threat actors behind the malware are lookingto further monetize the botnet beyond cryptocurrency mining and DDoS-for-hire, and keep up with their competitors in the cybercrime market by offering a diverse slate of illicit services.
"While Chaos is not a new malware, its continued evolution highlights the dedication of cybercriminals to expand their botnets and enhance the capabilities at their disposal," Darktrace concluded. "The recent shift in botnets such as AISURU and Chaos to include proxy services as core features demonstrates that denial-of-service is no longer the only risk these botnets pose to organizations and their security teams."
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.
SHARE
Tweet
Share
Share
SHARE
botnet, Cloud security, Cryptomining, cybersecurity, ddos, Hadoop, Malware, network security, Phishing, Threat Intelligence
Trending News
China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips
New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks
Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
AI Will Change Cybersecurity. Humans Will Define Its Success. A Lesson No Algorithm Can Teach
Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority
Block the Prompt, Not the Work: The End of "Doctor No"
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More
Load More ▼
Popular Resources
[Demo] Discover SaaS Risks and Monitor Every App in Your Environment
SANS SEC401: Get Hands On Skills to Detect and Respond to Cyber Threats
Detect AI-Driven Threats Faster With Full Network Visibility
[Guide] Learn How to Govern AI Agents With Proven Market Guidance