New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
09.04.2026
18015

Chaos malware targets misconfigured cloud deployments, detected by Darktrace in 2025, expanding botnet monetization via proxy services.
Chaos is back — and it's targeting your cloud misconfigs
Hold up, cloud bros — Chaos malware just leveled up. Darktrace spotted this new variant in 2025, and it's hunting for misconfigured cloud deployments like they're free crypto. The twist? It's now packing a SOCKS proxy to monetize that botnet harder.
This isn't just another cryptojacker. Chaos is evolving its playbook, adding proxy services to turn compromised systems into cash cows. If your cloud setup has even a tiny gap, this thing will find it and own it.

The malware's targeting Hadoop, Docker, Redis — basically any cloud service you might've left open by accident. Once it's in, it drops the SOCKS proxy and turns your infra into a relay for shady traffic. Cha-ching for the attackers, nightmare for you.
- • Targets: Misconfigured cloud deployments (Hadoop, Docker, Redis, etc.)
- • New feature: SOCKS proxy for botnet monetization
- • Detected by: Darktrace in 2025
- • Monetization: Proxy services + cryptomining
- • Threat level: High — evolves fast, monetizes aggressively
Bottom line: Chaos isn't playing around. It's hunting for cloud misconfigs, dropping proxies, and cashing in. If you're not locking down your deployments, you're basically funding their next attack. Get your security game tight — this variant means business.
#botnets#malware#cryptojacking#cloud misconfigurations#cloud security#proxy networks
Got a topic? Write to ATLA WIRE on Telegram:t.me/atla_community

