#botnet

[ follow ]
#ransomware
fromThe Hacker News
1 week ago
Information security

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

The Gentlemen ransomware group uses SystemBC malware to target over 1,570 victims, employing sophisticated tactics for initial access and lateral movement.
fromThe Hacker News
1 month ago
Information security

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

A Russian national was sentenced to two years for managing a botnet used in ransomware attacks against U.S. companies.
Information security
fromThe Hacker News
1 week ago

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

The Gentlemen ransomware group uses SystemBC malware to target over 1,570 victims, employing sophisticated tactics for initial access and lateral movement.
#cybersecurity
Privacy technologies
fromTheregister
9 months ago

Google sues 25 alleged BadBox 2.0 botnet operators

Google has filed a lawsuit against 25 individuals in China for creating and operating the BadBox 2.0 botnet, which has infected over 10 million devices globally.
Information security
fromThe Hacker News
1 week ago

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

A new botnet named PowMix targets Czech Republic's workforce, utilizing advanced evasion techniques and multi-stage infection methods since December 2025.
Information security
fromThe Hacker News
3 weeks ago

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

Masjesu is a stealthy botnet designed for DDoS attacks, targeting IoT devices while ensuring low visibility and persistence.
Information security
fromMail Online
1 month ago

FBI exposes three signs your smart devices have been secretly hijacked

Cybercriminals can hijack smart devices, leading to increased data usage and internet charges, while turning devices into part of a botnet.
Roam Research
fromArs Technica
1 month ago

14,000 routers are infected by malware that's highly resistant to takedowns

A 14,000-device botnet called KadNap primarily compromises unpatched Asus routers to create a takedown-resistant proxy network for cybercrime using peer-to-peer Kademlia architecture.
Information security
fromThe Hacker News
3 weeks ago

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

A new variant of the Phorpiex botnet combines traditional and peer-to-peer communication, facilitating sophisticated malware operations and high-volume spam.
Information security
fromThe Hacker News
3 weeks ago

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

A campaign targets ComfyUI instances for cryptocurrency mining and botnet enlistment through remote code execution exploits.
#cybercrime
Roam Research
fromTechCrunch
11 months ago

FBI and Dutch police seize and shut down botnet of hacked routers | TechCrunch

Operation Moonlander successfully shut down botnet services and indicted four individuals due to compromised internet-connected devices.
Roam Research
fromTechCrunch
11 months ago

FBI and Dutch police seize and shut down botnet of hacked routers | TechCrunch

Operation Moonlander successfully shut down botnet services and indicted four individuals due to compromised internet-connected devices.
#malware
Information security
fromThe Hacker News
2 months ago

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Aeternum C2 botnet uses Polygon blockchain for command-and-control infrastructure, making it resistant to traditional takedown methods by storing instructions on immutable public ledgers.
#ddos
#systembc
fromThe Hacker News
3 months ago

Google Disrupts IPIDEA - One of the World's Largest Residential Proxy Networks

Residential proxy networks have become a pervasive tool for everything from high-end espionage to massive criminal schemes,
Information security
fromThe Hacker News
3 months ago

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025. AISURU and its Android counterpart, Kimwolf, have emerged as some of the biggest botnets in recent times, capable of directing enslaved devices to participate in distributed denial-of-service (DDoS) attacks and relay malicious traffic for residential proxy services.
Information security
Information security
fromThe Hacker News
3 months ago

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

GoBruteforcer compromises crypto and blockchain project servers to build a botnet that brute-forces FTP, MySQL, PostgreSQL, and phpMyAdmin credentials.
#android
Information security
fromThe Hacker News
6 months ago

PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign

PolarEdge is a TLS-based ELF backdoor that infects routers to form an ORB-like botnet, sending host fingerprints and accepting commands over mbedTLS.
#rondodox
Information security
fromThe Hacker News
7 months ago

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

A TOR-based cryptojacking campaign exploits exposed Docker APIs to deploy miners, establish persistence, scan for other Docker instances, and potentially build a botnet.
Node JS
fromThe Hacker News
11 months ago

New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto

A new Go-based botnet, PumaBot, targets IoT devices with brute-force SSH attacks to expand and deliver malware.
fromThe Hacker News
11 months ago

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks.
Tech industry
[ Load more ]