Wednesday, January 1, 2025

Botnet

Hacker Compromised Several IoT Botnet C2 Servers and Taken Control of It Due to Weak Credentials

A Hacker who goes by name Subby has compromised more than 29 IoT botnet command and control servers that were using weak login credentials.He...

Newly Emerging DDoS Botnet Attack on Electrum Takes 152,000 Hosts Under its Control

Newly Emerging DDoS botnet attack that targets one of the most popular bitcoin wallet Electrum and now it reaches the 152,000 infected hosts.This DDoS...

Hackers Offered IoT Botnet as Service “TheMoon” : Botnet-as-a-Service

TheMoon botnet was first identified in 2014 and it targets exploits on the router developed by companies such as Linksys, ASUS, MikroTik and D-Link.The...

unCaptcha2 Bypassed Google ReCaptcha with 91% Accuracy

Researchers from the University of Maryland recently break the Google's ReCaptcha audio challenge system using new unCaptcha2 with 91% of accuracy.ReCaptcha...

Now Mirai Malware Attack as Miori delivered via Delivered via Remote Code Execution Exploit

Most Destructive IoT malware Mirai now being delivered as Miori and its spreading via dangerous remote code execution exploits.Mirai malware has strong records of...

UPnProxy – A Dubbed NSA Hacking Tool of EternalSilence Vulnerable to Attack 277,000 UPnP Enabled Routers

New research reveals that  Universal Plug and Play (UPnP) implemented 277,000 Connected Devices are vulnerable to malicious proxy system UPnProxy , a dubbed EternalSilence NSA hacking tool arsenal.UPnP...

New Hacking Group Outlaw Distributing Botnet to Scan The Network & Perform Cryptocurrency-Mining & Brute-Force Attack

A new hacking group called Outlaw distributing powerful botnet in order to perform the network scanning crypto-mining operation, a brute-force attack on vulnerable systems.This new threat...

Outlaw Hacking Group Using Command Injection Flow To Attack Organizations Network using Botnet via C&C Server

Outlaw Hacking group uses command injection vulnerability in IoT devices and Linux servers to distribute botnets. The threat actors compromised the FTP servers of...