Attackers have complete control over compromised devices, which can then join the botnet. Further attacks, such as distributed denial-of-service (DDoS) attacks, can be carried out using such devices. The functions used by the botnet client samples are remarkably similar. The infrastructure used by the botnet client samples in those operations is the same.
Customers of Palo Alto Networks Next Generation Firewall are protected by Cloud-Delivered Security Services including IoT Security, Advanced Threat Prevention, WildFire, and Advanced URL Filtering, which can assist in identifying and obstructing malware and exploit traffic.Both operations make use of malware shell script downloaders that are nearly identical.