
""Built for persistence and low visibility, Masjesu favors careful, low-key execution over widespread infection, deliberately avoiding blocklisted IP ranges such as those belonging to the Department of Defense (DoD) to ensure long-term survival.""
""As an emerging botnet family, XorBot is showing a strong growth momentum, continuously infiltrating and controlling new IoT devices.""
""Notably, these controllers are increasingly inclined to use social media platforms such as Telegram as the main channels for recruitment and promotion, attracting target 'customers' through initial active promotional activities.""
Masjesu, also known as XorBot, is a botnet identified for its DDoS-for-hire capabilities, targeting various IoT devices. It operates with a focus on persistence and low visibility, avoiding detection by steering clear of blocklisted IPs. The botnet has evolved to include multiple command injection and code execution exploits, enhancing its ability to infiltrate devices from various manufacturers. Its marketing strategy leverages social media platforms like Telegram to attract customers, indicating a growing trend in botnet recruitment and expansion.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]