Botnet

Newly Emerging DDoS Botnet Attack on Electrum Takes 152,000 Hosts Under its Control

Newly Emerging DDoS botnet attack that targets one of the most popular bitcoin wallet Electrum and now it reaches the…

6 years ago
Hackers Offered IoT Botnet as Service “TheMoon” : Botnet-as-a-ServiceHackers Offered IoT Botnet as Service “TheMoon” : Botnet-as-a-Service

Hackers Offered IoT Botnet as Service “TheMoon” : Botnet-as-a-Service

TheMoon botnet was first identified in 2014 and it targets exploits on the router developed by companies such as Linksys,…

6 years ago
Operation Power OFF -Authorities Tracking Down the largest Market place offering DDoS-for-hire ServicesOperation Power OFF -Authorities Tracking Down the largest Market place offering DDoS-for-hire Services

Operation Power OFF -Authorities Tracking Down the largest Market place offering DDoS-for-hire Services

The Operation Power OFF has taken down the largest illegal market place offering DDoS-for-hire service Webstresser[.]org last April. Authorities collected…

6 years ago
New Hacking Group Outlaw Distributing Botnet to Scan The Network & Perform Cryptocurrency-Mining & Brute-Force AttackNew Hacking Group Outlaw Distributing Botnet to Scan The Network & Perform Cryptocurrency-Mining & Brute-Force Attack

New Hacking Group Outlaw Distributing Botnet to Scan The Network & Perform Cryptocurrency-Mining & Brute-Force Attack

A new hacking group called Outlaw distributing powerful botnet in order to perform the network scanning crypto-mining operation, a brute-force attack on…

6 years ago
Outlaw Hacking Group Using Command Injection Flow To Attack Organizations Network using Botnet via C&C ServerOutlaw Hacking Group Using Command Injection Flow To Attack Organizations Network using Botnet via C&C Server

Outlaw Hacking Group Using Command Injection Flow To Attack Organizations Network using Botnet via C&C Server

Outlaw Hacking group uses command injection vulnerability in IoT devices and Linux servers to distribute botnets. The threat actors compromised…

6 years ago
New DemonBot Attack Hadoop Clusters to Performing DDoS Attacks using Powerful Cloud infrastructure serversNew DemonBot Attack Hadoop Clusters to Performing DDoS Attacks using Powerful Cloud infrastructure servers

New DemonBot Attack Hadoop Clusters to Performing DDoS Attacks using Powerful Cloud infrastructure servers

New Botnet called DemonBot targeting Hadoop Clusters in order to perform DDOS attack using powerful cloud infrastructure. Hadoop is an…

7 years ago
Chalubo Botnet Compromise Your Server or IoT Device & Use it for DDOS AttackChalubo Botnet Compromise Your Server or IoT Device & Use it for DDOS Attack

Chalubo Botnet Compromise Your Server or IoT Device & Use it for DDOS Attack

Newly Discovered Chalubo Botnet that compromises the internet facing SSH servers on Linux-based systems, IOT Devices and uses it for…

7 years ago
Torii Botnet – A New Sophisticated IoT Botnet Attack in Wide – More Powerful Than MiraiTorii Botnet – A New Sophisticated IoT Botnet Attack in Wide – More Powerful Than Mirai

Torii Botnet – A New Sophisticated IoT Botnet Attack in Wide – More Powerful Than Mirai

Most Sophisticated Torii Botnet discovered that spreading with more advanced techniques than famous Mirai Botnet but different than Mirai functionality. Malware…

7 years ago
New Xbash Malware Attack on Linux & Windows with Botnet, Ransomware & Coinminer CapabilitiesNew Xbash Malware Attack on Linux & Windows with Botnet, Ransomware & Coinminer Capabilities

New Xbash Malware Attack on Linux & Windows with Botnet, Ransomware & Coinminer Capabilities

Newly discovered Xbash malware with multiple capabilities such as  Botnet, Ransomware & Coinminer to compromise windows and Linux machine which is controlled…

7 years ago
HNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims NetworksHNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims Networks

HNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims Networks

HNS(Hide & Seek) IoT botnet attack victims network using router-based vulnerabilities such as  CVE-2016-10401 to propagate malicious code and steal the…

7 years ago