Fronton Botnet Tracks Online Activity and More

  • By Steven
  • Published: May 25, 2022
  • Last Updated: May 25, 2022

A botnet referred to as Fronton tracks activity on the internet and conducts illegal operations. The IoT botnet aims to steal information, disinform, and wreak general havoc on the web. Let’s take a closer look at what the Fronton botnet is really all about and highlight why updating your digital defenses is so important as new threats emerge.

What Does the Fronton Botnet Do?

Fronton botnet does more than transmit denial of service attacks. The botnet is also capable of tracking activity and trends on social media. In fact, the botnet is advanced to the point that it can even transmit information considered to be propaganda. The recent analysis of the botnet makes it quite clear that this highly advanced tool for digital criminal activity is much more advanced than investigators first assumed.  

If digital security specialists with Nisos are correct, the Fronton malware is now capable of delivering attacks beyond those of the DDoS variety. The malware can now generate a considerable number of faux social media accounts that can be used to alter the social media landscape as desired. In general, the Fronton botnet is respected by those in the digital security industry as it represents a full-fledged system for the coordination of digital attacks on a sizable scale.

When Did the Botnet First Emerge?

The Fronton botnet hit the scene in the spring of 2020. At that time, a hacktivist group insisted it acquired documents that were allegedly from a contractor with the Russian Federal Security Service that was supposedly related to the digital offensive. Today, Fronton’s botnet functions as a backend infrastructure for social media disinformation.  

The malware consists of IoT devices that execute DDoS offensives and campaigns aimed to disinform. The system uses SANA, an internet-based dashboard that empowers users to develop and deploy events trending on social media. The system generates such events it calls newsbreaks, using the botnet as transport of sorts.

SANA ultimately shapes public perception of the news and other matters by generating phony social media accounts with phone numbers and email addresses that seem real. The faux content is then transmitted across a litany of social media networks, forums, blogs, and other avenues on the web. The platform is even advanced to the point that it can change the number of reactions, comments, and likes for its users. 

What are Response Models?

Response models are specifically created to conduct specific actions after one of the aforementioned newsbreaks is mentioned. A response model empowers the bot group to react to the news in question, either neutrally, negatively, or positively. The operator then specifies the responses to the post in question, even plucking comments from dictionary lists, all in an attempt to manipulate other users of social media platforms.  

However, there is still some question about how effective such online attacks can really be when employed on a mass scale. Though digital researchers and social media experts are quick to point out the potential for social media to be manipulated, no one is quite sure to the extent to which the activity of others on social media shapes the public’s perception of current issues and events.
 

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

What is Bait and Switch Scams: How it Works and How to Avoid It

What is Bait and Switch Scams: How it Works and How to Avoid It

Ever follow an ad featuring limited-time products to a company's web page only to find they're selling something else entirely?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close