botnet

  1. Father

    The Ivanti exploit chain is actively used to implement the Mirai botnet

    CVE-2023-46805 and CVE-2024-21887 – one-way tickets for your network security. New vulnerabilities in Ivanti Connect Secure devices allow attackers to deploy the Mirai botnet. This is reported by security researchers from Juniper, indicating the active exploitation of two...
  2. Father

    The FBI announced a hunt for the owner of a botnet network from Moldova

    Law enforcement officers could not forgive Lefterov for infecting tens of thousands of American computers. In the United States, an indictment was filed against a Moldovan citizen, Alexander Lefterov, who is the owner of a large botnet network that infected thousands of computers across the...
  3. Father

    Botnet in every home: Hackers Once again enslave TP-Link routers for DDoS Attacks

    A year-old vulnerability continues to add to the inventory of cybercriminals. Informs Fortinet that attackers continue to exploit a year-old vulnerability in TP-Link routers, adding routers to various botnets to conduct DDoS attacks. The command injection vulnerability CVE-2023-1389 (CVSS...
  4. Father

    Nagios XI vulnerabilities can turn your server into part of a botnet

    Update your system now to avoid cyber attacks. Positive Technologies specialists have discovered a number of dangerous vulnerabilities in the Nagios XI system designed for monitoring IT infrastructure. The software is used in data centers, telecommunications companies, hosting providers, and...
  5. Teacher

    Destruction of the Moobot botnet: the US returns security to Ubiquiti routers

    Intelligence operations of cybercriminals were interrupted by the US authorities. The US authorities destroyed a botnet that was used to conduct espionage and cyber attacks on American and international targets. The law enforcement operation was carried out in January and included the removal...
  6. Teacher

    KV-botnet: Chinese hackers change tactics after US operation

    What is the risk of reorganizing KV-Botnet for American organizations? Cybersecurity specialists from Lumen note "behavioral changes" in the activities of the Chinese malicious KV-botnet network after US law enforcement agencies began to take measures to neutralize it. KV-botnet is a network...
  7. Brother

    Telepandemia: botnet "Bigpanzi" turned hundreds of thousands of TV set-top boxes into controlled puppets

    The number of infected devices is growing every day. How do I protect myself? Beijing-based Qianxin identified a cybercrime network called "Bigpanzi" that infects Android TV and eCos devices with malware. The geography of infections is truly extensive, and the grouping has been functioning...
  8. Brother

    NKAbuse: Hackers adapted the decentralized NKN protocol to create a stealth botnet

    The distributed nature of the blockchain makes it possible to effectively mask malicious activity. Kaspersky Lab recently discovered a new feature-rich malware called NKAbuse, which uses the decentralized NKN communication protocol to exchange data between infected devices. NKN is described as...
  9. Lord777

    InfectedSlurs Botnet

    Akamai analysts warn that the new Mirai botnet InfectedSlurs exploits two 0-day vulnerabilities for remote code execution on routers and NVR (Network Video Recorder). Infected devices become part of a DDoS botnet, which is then rented out to other attackers for profit. Although researchers...
  10. Lord777

    InfectedSlurs botnet en masse Recruits network devices to its DDoS Battalion

    Both simple routers and video surveillance devices are at risk. According to fresh data provided by cybersecurity company Akamai, researchers recently discovered a new botnet based on the legendary Mirai malware. The malicious infrastructure is called "InfectedSlurs". For distribution, it uses...
  11. Lord777

    A brief history of the Mirai megabotnet

    In 2016, three young American hackers, who recently started their career in this field, created a botnet called Mirai, with which they attacked major media, websites and companies for a long time. Their goal was to draw attention to the problem of vulnerabilities in the Internet of Things and...
  12. Lord777

    The FBI eliminated the IPStorm botnet

    The FBI eliminated the IPStorm botnet and its infrastructure after the IPStorm owner made a deal with the investigation in September. The US Department of Justice announced the dismantling of the IPStorm botnet infrastructure, which affected thousands of Linux, Mac and Android devices across...
  13. Lord777

    From phishing to P2P: The Socks5Systemz botnet turned 10,000 devices into digital hostages

    BitSight detected an army of proxies that were victims of large-scale infections. BitSight specialists have discovered a new large botnet network called Socks5Systemz, which has already managed to infect about 10,000 devices using malicious uploaders PrivateLoader and Amadey. The infections...
  14. Carding 4 Carders

    The Mozi botnet is slowly dying: who is responsible for dismantling the vast malicious network

    ESET researchers have revealed a secret weapon against malware. ESET cybersecurity experts have reported what they believe is the "targeted" destruction of the Mozi botnet, which penetrated more than a million Internet of Things (IoT) devices worldwide. Mozi, identified in 2019 by 360 Netlab...
  15. Carding

    Miser pays twice: Mirai botnet turns cheap Android TV set-top boxes into cyberweapons

    A story about when savings lead to security compromises. Specialists of the information security company Dr. Researchers have discovered a new version of the Mirai malware that infects budget Android TV set-top boxes. The variant is a new version of the Pandora backdoor, which first appeared in...
  16. Carding

    KmsdBot Botnet: When the Internet of Things becomes the Internet of Problems

    An updated version of KmsdBot or your smart toaster-who will be smarter? The updated version of the KmsdBot malware botnet expands its capabilities and targets Internet of Things (IoT) devices. This makes it one of the most adaptive and dangerous tools for cyber attacks. According to Akamai...
  17. Carding

    A botnet. HVNC.

    Hey, buddy! How was your start to the week? In the last article, we looked at the possible types of Internet connections. But while VPNs can still be considered an official service, proxies, dedicks, SSH, and VNC presented on the black market are often obtained by exploiting vulnerabilities...
  18. N

    Premium development of any projects.

    Premium development of any projects. I develop any projects, any subject matter Languages: PHP, Python, C#, C++ Autoregistrars Parsers Bots Clickers Cryptoprojects Proxying any sites Online stores Development of other people's projects Connection of payment systems Services available to...
  19. Lord777

    Detailed manual: botnet

    If you don't know what a botnet is, then this article probably won't be very useful to you. But if you have ever thought about raising your botnet, it will help you avoid stepping on the same rake that most people face. So, let's get started! Topic The botnet is always taken under the theme...
  20. Lord777

    Installing and configuring a botnet

    Guide Navigation Installing a botnet on Android Installing a botnet on Linux (Debian-based) Installing a botnet on Windows (Wsl2) Installing a botnet on Linux (Arch-based) Installing a botnet on macOS Universal installation on Linux Botnet Configuration Starting and adding sessions FAQ If...
Top