By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
Computing

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

News Room
Last updated: 2026/04/08 at 2:47 PM
News Room Published 8 April 2026
Share
New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
SHARE

Ravie LakshmananApr 08, 2026Cryptomining / Network Security

Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat’scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet’s targeting infrastructure.

“Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices,” Darktrace said in a new report.

Chaos was first documented by Lumen Black Lotus Labs in September 2022, describing it as a cross-platform malware capable of targeting Windows and Linux environments to run remote shell commands, drop additional modules, propagate to other hosts by brute-forcing SSH keys, mine cryptocurrency, and launch distributed denial-of-service (DDoS) attacks via HTTP, TLS, TCP, UDP, and WebSocket.

The malware is assessed to be an evolution of another DDoS malware known as Kaiji that has singled out misconfigured Docker instances.It’s currently not known who is behind the operation, but the presence of Chinese language characters and the use of China-based infrastructure suggest that the threat actor could be of Chinese origin.

Darktrace said it identified the new variant targeting its honeypot network last month, a deliberately misconfigured Hadoop instance that enables remote code execution on the service. In the attack spotted by the cybersecurity company, the intrusion commenced with an HTTP request to the Hadoop deployment to create a new application.

The application, for its part, embedded a sequence of shell commands to retrieve a Chaos agent binary from an attacker-controlled server (“pan.tenire[.]com”), set permissions to allow all users to read, modify, or run it (“chmod 777”), and then actually execute the binary and delete the artifact from disk to minimize the forensic trail.

An interesting aspect of the attack is that the domain was previously put to use in connection with an email phishing campaign carried out by the Chinese cybercrime group Silver Fox to deliver decoy documents and ValleyRAT malware. The campaign was codenamed Operation Silk Lure by Seqrite Labs in October 2025.

The 64-bit ELF binary is a restructured and updated version of Chaos that reworks several of its functions, while keeping most of its core feature set intact. One of the more significant changes, however, concerns the removal of functions that enabled it to spread via SSH and exploit router vulnerabilities.

Taking their place is a new SOCKS proxy feature that allows the compromised system to be used for ferrying traffic, thereby concealing the true origins of malicious activity and making it harder for defenders to detect and block the attack.

“In addition, several functions that were previously believed to be inherited from Kaiji have also been changed, suggesting that the threat actors have either rewritten the malware or refactored it extensively,” Darktrace added.

The addition of the proxy feature is likely a sign that threat actors behind the malware are lookingto further monetize the botnet beyond cryptocurrency mining and DDoS-for-hire, and keep up with their competitors in the cybercrime market by offering a diverse slate of illicit services.

“While Chaos is not a new malware, its continued evolution highlights the dedication of cybercriminals to expand their botnets and enhance the capabilities at their disposal,” Darktrace concluded. “The recent shift in botnets such as AISURU and Chaos to include proxy services as core features demonstrates that denial-of-service is no longer the only risk these botnets pose to organizations and their security teams.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Capita’s troubled Civil Service Pension Scheme hit by data breach | Computer Weekly Capita’s troubled Civil Service Pension Scheme hit by data breach | Computer Weekly
Next Article I Tried Dyson’s First Robot Mop. I Wasn’t Blown Away I Tried Dyson’s First Robot Mop. I Wasn’t Blown Away
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Folding iPhone unveiling & shipment date rumors are all over the place
Folding iPhone unveiling & shipment date rumors are all over the place
News
Cool New Insta360 Gadget Can Level Up Your iPhone Selfies, But Android Can’t Use It As Well – BGR
Cool New Insta360 Gadget Can Level Up Your iPhone Selfies, But Android Can’t Use It As Well – BGR
News
The Complete Guide to AI Coding Agents in 2026: Codex vs Claude Code vs Gemini Code Assist – Chat GPT AI Hub
The Complete Guide to AI Coding Agents in 2026: Codex vs Claude Code vs Gemini Code Assist – Chat GPT AI Hub
Computing
The next generation of Android Ultra flagships might not see the light of day
The next generation of Android Ultra flagships might not see the light of day
News

You Might also Like

The Complete Guide to AI Coding Agents in 2026: Codex vs Claude Code vs Gemini Code Assist – Chat GPT AI Hub
Computing

The Complete Guide to AI Coding Agents in 2026: Codex vs Claude Code vs Gemini Code Assist – Chat GPT AI Hub

29 Min Read
Sultan’s Game hits 250,000 Steam sales in debut week · TechNode
Computing

Sultan’s Game hits 250,000 Steam sales in debut week · TechNode

4 Min Read
Claude Mythos Preview: Inside Anthropic’s Most Powerful AI Model and Why It’s Being Restricted – Chat GPT AI Hub
Computing

Claude Mythos Preview: Inside Anthropic’s Most Powerful AI Model and Why It’s Being Restricted – Chat GPT AI Hub

28 Min Read
Ready to Expand in Asia? BEYOND Expo’s Regional Cooperation Forums Are Where Global Ambitions Take Off · TechNode
Computing

Ready to Expand in Asia? BEYOND Expo’s Regional Cooperation Forums Are Where Global Ambitions Take Off · TechNode

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?