Description

Cybercriminals are leveraging misconfigured Jupyter Notebooks as unwitting accomplices in a novel DDoS attack campaign. Dubbed Panamorfi, the threat actors are repurposing a Minecraft DDoS tool called mineping to launch TCP flood attacks. These attacks involve compromising exposed Jupyter Notebook instances to download malicious code from a file-sharing platform. Once executed, this code establishes a connection to a Discord channel, triggering the DDoS attack. The campaign highlights the critical importance of securing internet-facing Jupyter Notebooks. This incident follows the October 2023 Qubitstrike attacks, underscoring a growing trend of adversaries targeting these environments for malicious purposes. Organizations must implement robust security measures to protect their Jupyter Notebooks from exploitation and prevent them from becoming part of a DDoS botnet.