UPDATED 23:54 EDT / JULY 12 2017

INFRA

New hacking tool that targets websites uses an easy smartphone interface

A new hacking tool operated via a smartphone to hijack websites is being praised on forums on a shady part of the Internet for its ease of use and ongoing support.

It’s called the “Katyusha Scanner,” after the Russian rocket launcher of the same name used during World War II. The SQL injection tool combines the Anarchi Scanner open-source penetration testing tool with the Telegram messaging service to allow a user to insert a list of websites they want tested for error-based, time-based and blind SQL injection flaws.

Capable of running attacks against several targets simultaneously, Katyusha doesn’t rely on a computer to run attacks but is operated via a smartphone, in this case the command structure being facilitated via Telegram. According to Recorded Future, which describes the tool as a “cyber weapon of war that fits in your pocket,” Katyusha was first released in April. Coupled with “outstanding support” and frequent updates, it has gained “accolades from grateful clients” because of “an intuitive and straightforward interface, as well as incredible performance.”

In addition to identifying vulnerabilities, Katyusha also can search for and export email password credentials, brute-force login credentials, automatically dump databases and upload web shells.

The main version of Katyusha Scanner is being offered on forums on the darknet for $500, with a light version with some limitations available for the cheaper price of $250 per license. For those not wanting to host the scanner themselves, a software as a service cloud-based version is available for $200 a month.

Although it sounds somewhat costly, the purchase price includes updates and support. The scanner already has undergone seven major updates since it was launched, presumably with the newer versions providing better SQL injection capabilities.

“The availability of a highly robust and inexpensive tool such as Katyusha Scanner to online criminals with limited technical skills will only intensify the compromised data problem experienced by various businesses, highlighting the importance of regular infrastructure security audits,” Recorded Future researchers concluded.

Photo: public domain/Wikimedia Commons

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU