home.social

#botnet — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #botnet, aggregated by home.social.

  1. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Pulse ID: 6a02ae32b11ecc72977b2a1b
    Pulse Link: otx.alienvault.com/pulse/6a02a
    Pulse Author: Tr1sa111
    Created: 2026-05-12 04:36:02

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HoneyPot #InfoSec #OTX #OpenThreatExchange #bot #botnet #Tr1sa111

  2. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Pulse ID: 6a02ae32b11ecc72977b2a1b
    Pulse Link: otx.alienvault.com/pulse/6a02a
    Pulse Author: Tr1sa111
    Created: 2026-05-12 04:36:02

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HoneyPot #InfoSec #OTX #OpenThreatExchange #bot #botnet #Tr1sa111

  3. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Pulse ID: 6a02ae32b11ecc72977b2a1b
    Pulse Link: otx.alienvault.com/pulse/6a02a
    Pulse Author: Tr1sa111
    Created: 2026-05-12 04:36:02

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HoneyPot #InfoSec #OTX #OpenThreatExchange #bot #botnet #Tr1sa111

  4. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Pulse ID: 6a02ae32b11ecc72977b2a1b
    Pulse Link: otx.alienvault.com/pulse/6a02a
    Pulse Author: Tr1sa111
    Created: 2026-05-12 04:36:02

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HoneyPot #InfoSec #OTX #OpenThreatExchange #bot #botnet #Tr1sa111

  5. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Pulse ID: 6a02ae32b11ecc72977b2a1b
    Pulse Link: otx.alienvault.com/pulse/6a02a
    Pulse Author: Tr1sa111
    Created: 2026-05-12 04:36:02

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HoneyPot #InfoSec #OTX #OpenThreatExchange #bot #botnet #Tr1sa111

  6. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.

    Pulse ID: 6a0199674dd4cf450633dd32
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:55:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault

  7. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.

    Pulse ID: 6a0199674dd4cf450633dd32
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:55:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault

  8. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.

    Pulse ID: 6a0199674dd4cf450633dd32
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:55:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault

  9. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.

    Pulse ID: 6a0199674dd4cf450633dd32
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:55:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault

  10. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.

    Pulse ID: 6a0199674dd4cf450633dd32
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:55:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault

  11. No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually

    Chrome is now LLM malware

    Chrome on all OS, silently installs an LLM on your local machine, (like) true authentic malware. It's 2 to 4 GB 4096MB in size, taking up space I'm certain you have reserved for something else.

    No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually.

    Google transformed Chrome into malware

    With billions 109 installations, the climate burden is Massive!

    thatprivacyguy.com/blog/chrome

    #Distributed #malware #Alphabet #Google #Chrome #silent #re #install #botnet #LLM #AI #Slop #Enshittification #programming #virus #fucked

  12. No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually

    Chrome is now LLM malware

    Chrome on all OS, silently installs an LLM on your local machine, (like) true authentic malware. It's 2 to 4 GB 4096MB in size, taking up space I'm certain you have reserved for something else.

    No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually.

    Google transformed Chrome into malware

    With billions 109 installations, the climate burden is Massive!

    thatprivacyguy.com/blog/chrome

    #Distributed #malware #Alphabet #Google #Chrome #silent #re #install #botnet #LLM #AI #Slop #Enshittification #programming #virus #fucked

  13. No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually

    Chrome is now LLM malware

    Chrome on all OS, silently installs an LLM on your local machine, (like) true authentic malware. It's 2 to 4 GB 4096MB in size, taking up space I'm certain you have reserved for something else.

    No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually.

    Google transformed Chrome into malware

    With billions 109 installations, the climate burden is Massive!

    thatprivacyguy.com/blog/chrome

    #Distributed #malware #Alphabet #Google #Chrome #silent #re #install #botnet #LLM #AI #Slop #Enshittification #programming #virus #fucked

  14. No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually

    Chrome is now LLM malware

    Chrome on all OS, silently installs an LLM on your local machine, (like) true authentic malware. It's 2 to 4 GB 4096MB in size, taking up space I'm certain you have reserved for something else.

    No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually.

    Google transformed Chrome into malware

    With billions 109 installations, the climate burden is Massive!

    thatprivacyguy.com/blog/chrome

    #Distributed #malware #Alphabet #Google #Chrome #silent #re #install #botnet #LLM #AI #Slop #Enshittification #programming #virus #fucked

  15. No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually

    Chrome is now LLM malware

    Chrome on all OS, silently installs an LLM on your local machine, (like) true authentic malware. It's 2 to 4 GB 4096MB in size, taking up space I'm certain you have reserved for something else.

    No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually.

    Google transformed Chrome into malware

    With billions 109 installations, the climate burden is Massive!

    thatprivacyguy.com/blog/chrome

    #Distributed #malware #Alphabet #Google #Chrome #silent #re #install #botnet #LLM #AI #Slop #Enshittification #programming #virus #fucked

  16. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  17. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  18. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  19. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  20. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  21. DDoS-for-Hire Operation Exposed: How an Operator's Debug Build Unraveled a Commercial Game-Server Botnet

    An exposed open directory on a Netherlands-hosted server revealed the complete operational toolkit of xlabs_v1, a Mirai-derived IoT botnet operated by an actor using the handle Tadashi. The operation provides DDoS-for-hire services specifically targeting game servers and Minecraft hosts through 21 distinct flood attack variants. The botnet exploits Android Debug Bridge (ADB) on TCP/5555 to compromise over 4 million potentially vulnerable IoT devices including Android TV boxes, smart TVs, and routers. The operation features bandwidth profiling to price-tier infected devices, ChaCha20 string encryption with cryptographic weaknesses, and competitor-eradication routines. Infrastructure analysis consolidated the entire operation within a single bulletproof /24 netblock in the Netherlands, with co-located cryptojacking infrastructure also identified.

    Pulse ID: 69f25f09e5c3a33611f7cb16
    Pulse Link: otx.alienvault.com/pulse/69f25
    Pulse Author: AlienVault
    Created: 2026-04-29 19:42:01

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #ChaCha20 #CryptoJacking #CyberSecurity #DDoS #DoS #Encryption #InfoSec #IoT #Minecraft #Mirai #OTX #OpenThreatExchange #RAT #TCP #TheNetherlands #bot #botnet #AlienVault

  22. Masz stary router TP-Link? Botnet Mirai aktywnie wykorzystuje lukę CVE-2023-33538 do przejęcia kontroli nad urządzeniami

    Badacze bezpieczeństwa z Unit42 alarmują o trwającej kampanii wymierzonej w posiadaczy starszych routerów TP-Link. Na celowniku są modele, które nie są już objęte wsparciem producenta (status End-of-Line): Cyberprzestępcy wykorzystują lukę oznaczoną jako CVE-2023-33538, która pozwala na wstrzykiwanie złośliwych poleceń (RCE, Remote Command Execution). Analizując próbki można dojść do wniosku, że...

    #Aktualności #Botnet #Malware #Mirai #Router

    sekurak.pl/masz-stary-router-t

  23. The Group Theory Inside Bedep's DGA

    Bedep was an ad-fraud botnet active from late 2014 through 2015, delivered through the Angler exploit kit. It employed an unusually sophisticated domain generation algorithm that used real foreign exchange rates from the European Central Bank combined with advanced group theory mathematics to generate command-and-control domains. Unlike typical DGAs that rely solely on date-based seeds, Bedep's algorithm fetched currency exchange rates and UTC timestamps from legitimate public sources, making future domains unpredictable until the data was published. The malware implemented mathematical concepts including cyclic groups, primitive root generators, and modular arithmetic to ensure collision-free domain generation. This unique approach made it significantly harder for defenders to pre-compute and block domains compared to conventional DGAs, as the exchange rates couldn't be predicted in advance.

    Pulse ID: 69e9525a37098f168ad6064f
    Pulse Link: otx.alienvault.com/pulse/69e95
    Pulse Author: AlienVault
    Created: 2026-04-22 22:57:30

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Bank #CyberSecurity #Europe #ICS #InfoSec #Malware #OTX #OpenThreatExchange #RAT #RCE #bot #botnet #AlienVault

  24. Untangling a Linux Incident With an OpenAI Twist (Part 2)

    A Linux endpoint was simultaneously compromised by at least two distinct threat actors while the developer user relied on OpenAI's Codex AI agent for security remediation. Actor A deployed a cryptominer mining Monero to a private pool. Actor B installed a multi-revenue botnet including XMRig mining, residential proxy services, and bandwidth-selling components with eight different persistence mechanisms. Actor C, potentially affiliated with Actor B, executed mass data exfiltration of 15 categories including SSH keys, cloud credentials, and API tokens. The threat actors exploited CVE-2025-55182 (React2Shell) affecting Next.js and React applications. While Codex identified some threats, it lacked contextual awareness and privileged access needed for comprehensive incident response, creating additional noise that complicated SOC investigation. The endpoint was ultimately secured through managed EDR telemetry and expert SOC analysis.

    Pulse ID: 69e95245cf3877ded3870cff
    Pulse Link: otx.alienvault.com/pulse/69e95
    Pulse Author: AlienVault
    Created: 2026-04-22 22:57:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cloud #CryptoMiner #CyberSecurity #EDR #Endpoint #InfoSec #Linux #OTX #OpenThreatExchange #Proxy #RAT #SMS #SSH #bot #botnet #AlienVault

  25. Mirai Campaign Exploits Command Injection Vulnerability in D-Link Routers

    Attackers are exploiting a command injection vulnerability in end of life D Link routers to deploy Mirai malware and expand botnet operations.

    Pulse ID: 69e95e18e14e580690a095ac
    Pulse Link: otx.alienvault.com/pulse/69e95
    Pulse Author: cryptocti
    Created: 2026-04-22 23:47:36

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Malware #Mirai #OTX #OpenThreatExchange #RAT #Vulnerability #bot #botnet #cryptocti

  26. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Pulse ID: 69e6fbc6a60343d558ae3cc8
    Pulse Link: otx.alienvault.com/pulse/69e6f
    Pulse Author: Tr1sa111
    Created: 2026-04-21 04:23:34

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #IoT #Mirai #OTX #OpenThreatExchange #Vulnerability #bot #botnet #Tr1sa111

  27. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.

    Pulse ID: 69e2824d25c0dbc3e1de156b
    Pulse Link: otx.alienvault.com/pulse/69e28
    Pulse Author: AlienVault
    Created: 2026-04-17 18:56:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault

  28. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.

    Pulse ID: 69e2824d25c0dbc3e1de156b
    Pulse Link: otx.alienvault.com/pulse/69e28
    Pulse Author: AlienVault
    Created: 2026-04-17 18:56:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault

  29. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.

    Pulse ID: 69e2824d25c0dbc3e1de156b
    Pulse Link: otx.alienvault.com/pulse/69e28
    Pulse Author: AlienVault
    Created: 2026-04-17 18:56:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault

  30. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.

    Pulse ID: 69e2824d25c0dbc3e1de156b
    Pulse Link: otx.alienvault.com/pulse/69e28
    Pulse Author: AlienVault
    Created: 2026-04-17 18:56:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault

  31. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.

    Pulse ID: 69e2824d25c0dbc3e1de156b
    Pulse Link: otx.alienvault.com/pulse/69e28
    Pulse Author: AlienVault
    Created: 2026-04-17 18:56:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault

  32. A Deep Dive Into Attempted Exploitation of CVE-2023-33538

    Active exploitation attempts targeting CVE-2023-33538 in end-of-life TP-Link Wi-Fi routers were identified after CISA added it to the KEV catalog in June 2025. The vulnerability affects several router models including TL-WR940N, TL-WR740N, and TL-WR841N. Observed attacks attempted to deploy Mirai-like botnet malware, specifically variants associated with the Condi IoT botnet. Through firmware emulation and reverse engineering, researchers confirmed the vulnerability exists but discovered that successful exploitation requires authentication. The in-the-wild attacks contained critical flaws: they targeted the wrong parameter (ssid instead of ssid1), lacked authentication, and relied on utilities not present in the router firmware. The command injection vulnerability in the WlanNetworkRpm endpoint allows remote attackers to execute arbitrary commands when authenticated. The malware establishes C2 communication and propagates across architectures. TP-Link confirmed affected devices are end-of-life with no patc...

    Pulse ID: 69e1f0ddb1aa33b71576ca92
    Pulse Link: otx.alienvault.com/pulse/69e1f
    Pulse Author: AlienVault
    Created: 2026-04-17 08:35:41

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AWS #CISA #CyberSecurity #Endpoint #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #Vulnerability #bot #botnet #AlienVault

  33. 1 TB of proxies, bro.
    Promise this is legit, bro.
    Just sign up, bro.
    We power proxies for about 10k teams, bro.
    2.6M owned IPs, bro.
    No credit card, bro.
    I know the email address looks sketchy, bro.
    It's definitely legit, bro.
    You'll see the 1TB, bro.

    #InfoSec #BotNet #Proxy #Bro

  34. Q1 2026 Malware Statistics Report for Linux SSH Servers

    Analysis of attacks against Linux SSH servers during Q1 2026 reveals P2PInfect worm as the dominant threat, representing 70.3% of all attack sources. DDoS botnets including Mirai, XMRig, Prometei, and CoinMiner were identified as primary threats. A notable campaign involved installing V2Ray proxy tools on compromised systems, attributed to a suspected Chinese threat actor. Attackers employed SSH brute-force techniques to gain access, executed reconnaissance commands to assess system information, and deployed V2Ray for proxy node operations. The campaign targeted poorly secured SSH servers with weak credentials, emphasizing the need for strong password policies, access controls, and network monitoring to detect unusual outbound connections and proxy-related activities.

    Pulse ID: 69de00c30406a5cbb6ba9eef
    Pulse Link: otx.alienvault.com/pulse/69de0
    Pulse Author: AlienVault
    Created: 2026-04-14 08:54:27

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Chinese #CoinMiner #CyberSecurity #DDoS #DoS #ICS #InfoSec #Linux #Malware #Mirai #OTX #OpenThreatExchange #Password #Proxy #RAT #RCE #SSH #Word #Worm #bot #botnet #AlienVault

  35. 😐 Аналітична доповідь: позов штату Техас проти TP-Link Systems Inc.

    1. Суть позову

    Генеральний прокурор штату Техас ініціював судове провадження проти TP-Link Systems Inc. за кількома напрямами:

    Оманливе маркування походження: продукція просувалася як «Made in Vietnam», тоді як критичні елементи виробництва та supply chain прив’язані до Китаю.

    Недостовірні заяви про безпеку: пристрої позиціонувалися як secure-by-design, попри наявність численних firmware-вразливостей.

    Кіберризики державного рівня: за твердженням позову, уразливості могли експлуатуватися структурами, пов’язаними з китайськими державними кіберопераціями.

    ---

    2. Юридична рамка

    Позов, імовірно, базується на:

    Законодавстві про захист прав споживачів (Deceptive Trade Practices)

    Data privacy regulation (state-level)

    Потенційно — норми, що стосуються національної безпеки (якщо доведено зв’язок із державними акторами)

    ---

    3. Ключові вимоги прокуратури

    Суду пропонується:

    🚫 Заборонити заяви про «виробництво у В’єтнамі» без прозорої деталізації

    🌐 Примусити до розкриття зв’язків із китайськими структурами

    🔐 Обмежити або призупинити збір даних без явної згоди користувачів

    🛠 Зобов’язати усунути бекдори та критичні вразливості

    ⚖️ Провести jury trial (суд присяжних)

    ---

    4. Технічний аспект (кібербезпека)

    Проблематика не нова для сегмента SOHO-обладнання:

    Часті кейси hardcoded credentials

    Вразливості в web-interface та remote management API

    Відсутність своєчасних security patches

    Ризик використання пристроїв у botnet-інфраструктурі (аналогії з Mirai-подібними сценаріями)

    Якщо твердження про бекдори підтвердяться, це переводить кейс із комерційної площини в геополітичну.

    ---

    5. Геополітичний контекст

    Цей позов вписується у ширший тренд:

    ескалація технологічного протистояння США — Китай

    підвищена увага до supply chain transparency

    кейси проти Huawei та ZTE як прецеденти

    TP-Link, як масовий постачальник мережевого обладнання, стає критичною точкою ризику через масштаб інсталяцій.

    ---

    6. Потенційні наслідки

    Для TP-Link:

    штрафи та примусові зміни маркетингової політики

    аудит безпеки продуктів

    репутаційні втрати на глобальному ринку

    Для ринку:

    посилення вимог до origin disclosure

    тренд на security certification для consumer-grade пристроїв

    перерозподіл частки ринку на користь альтернативних брендів

    Для користувачів:

    зростання обізнаності щодо ризиків мережевого обладнання

    попит на open-source firmware (OpenWRT-клас рішень)

    ---

    7. Висновок

    Позов проти TP-Link Systems Inc. — це не лише про маркування або маркетинг. Це комбінований кейс на перетині кібербезпеки, споживчого права та геополітики, який може сформувати нові стандарти прозорості для всього сегмента мережевого обладнання.

    ---

    #хештеги

    #TPLink #Texas #кибербезпека #CyberSecurity #China #USA #DataPrivacy #Backdoor #IoT #RouterSecurity #Firmware #InfoSec #SupplyChain #TechWar #Huawei #ZTE #мережі #інтернетбезпека #botnet #вразливості #геополітика #санкції #аналіз #security #privacy

  36. How Criminals Can Exploit the Blockchain Name Space

    On March 19, Wired published an article on how the US Justice Department and law enforcement agencies of collaborating countries took down the command-and-control of several botnets that were used for a huge number of cyberattacks, such as Distributed Denial of Service attacks

    In this article, Interisle's Andy Malis look at botnets generally and how they exploit the DNS. He thens looks at a variation of the conventional botnet exploitation of the DNS that leverages the name space for Ethereum blockchain.

    interisle.substack.com/p/how-c

    #botnet #malware #ethereum #ENS #blockchain #DNS

  37. It turns out #Mirai malware isn’t fading, it’s multiplying. Hundreds of Mirai-based variants now host massive botnet growth, exploiting weak IoT devices and evolving attack methods.

    Read more: hackread.com/mirai-malware-var

    #Botnet #CyberSecurity #IoT #Malware #DDoS

  38. Erfolgreicher Schlag gegen Cyberkriminalität! 🚨 Internationale Ermittler aus USA, Deutschland & Kanada haben vier mächtige Botnetze (Aisuru, Kimwolf, JackSkid, Mossad) zerschlagen – über 3 Mio. infizierte Geräte wie Router & Webcams lahmgelegt. Hunderttausende DDoS-Angriffe, auch auf US-Militärseiten, gestoppt. Administratoren in DE & CA gefasst. 💻🔒 n-tv.de/technik/Maechtige-Scha #Cybersecurity #Botnet #DDoS #Cybercrime #Newz

  39. The strategy of (presumable AI operated) botnet trying to spam #fcz instance with fake accounts (for whatever purpose) is somewhat funny. They somehow figured out, that I am moderator - so the first thing these profiles do is to block me.

    Which makes my job extremely easy, as I really can just delete all accounts, which block me (if it is the first thing they do: before posting anything, following anybody, or so). Of course, there is also distinct pattern of weird mail servers they use.

    The strategies of our new AI overlords remind me more of "intelligence" of insects, like mosquitos, or so. Dumb, but the problem is persistence of their activity...

    #moderation #botnet

  40. KadNap: Wie ein neues Botnetz tausende Asus-Router als Proxy-Knoten missbraucht

    Die Schadsoftware setzt auf ein dezentrales Peer-to-Peer-Protokoll, um ihre Steuerungsinfrastruktur vor Entdeckung zu schützen – ein Ansatz, der herkömmliche Abwehrmethoden gezielt unterläuft.

    all-about-security.de/kadnap-w

    #botnet #asus #router #peertopeer #proxy

  41. #Kimwolf #Botnet Swamps #Anonymity Network #I2P

    For the past week, the massive “Internet of Things” ( #IoT;) botnet known as Kimwolf has been disrupting The #InvisibleInternetProject ( #I2P ), a decentralized, #encrypted communications network designed to #anonymize and secure online communications.
    #privacy #security #encryption

    krebsonsecurity.com/2026/02/ki

  42. New, from me: Who Operates the Badbox 2.0 Botnet?

    The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people behind Badbox 2.0, and thanks to bragging by the Kimwolf botmasters we may now have a much clearer idea about that.

    krebsonsecurity.com/2026/01/wh

    #infosec #botnet #IoT #Android #Google #threatresearch

  43. New, from me: The Kimwolf Botnet is Lurking in Corporate, Govt. Networks

    A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf’s ability to scan the local networks of compromised systems for other IoT devices to infect makes it a sobering threat to organizations, and new research reveals Kimwolf is surprisingly prevalent in government and corporate networks.

    krebsonsecurity.com/2026/01/ki

    #botnet #infosec #IoT #DDoS #threatresearch #malware

  44. Dziurawe cyfrowe ramki na zdjęcia – szereg poważnych luk bezpieczeństwa w popularnych urządzeniach

    Doniesienia na temat problemów z bezpieczeństwem w świecie IoT znajdują się już w naszym stałym repertuarze, jednak opleceni coraz gęstszą siecią sprzętu zaliczanego do tej grupy często nie zdajemy sobie sprawy skąd czyhają kolejne zagrożenia. Tym razem pochylimy się nad raportem zespołu Quokka. Badacze wzięli na warsztat popularne cyfrowe ramki...

    #Aktualności #Android #Awareness #Botnet #Chiny #Fotografie #Malware #Md5 #PathTraversal #Quokka #Ramki #Szpiegostwo #Uhale #Wyciek

    sekurak.pl/dziurawe-cyfrowe-ra