Jump to content

Search the Community

Showing results for tags 'botnet'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station


  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 19 results

  1. The bitcoin blockchain is helping keep a botnet from being taken down Wallet transactions camouflage the IP address of the botnet's control server. Enlarge Aurich Lawson / Ars Technica When hackers corral infected computers into a botnet, they take special care to ensure they don’t lose control of the server that sends commands and updates to the compromised devices. The precautions are designed to thwart security defenders who routinely dismantle botnets by taking over the command-and-control server that admini
  2. Android devices ensnared in DDoS botnet New Matryosh botnet is targeting Android systems that have left their ADB debug interface exposed on the internet. Netlab, the networking security division of Chinese security firm Qihoo 360, said it discovered this week a new fledgling malware operation that is currently infecting Android devices for the purpose of assembling a DDoS botnet. Named Matryosh, the botnet is going after Android devices where vendors have left a diagnostics and debugging interface known as Android Debug Bridge enabled and exposed on t
  3. DreamBus botnet targets enterprise apps running on Linux servers DreamBus botnet uses exploits and brute-force to target PostgreSQL, Redis, SaltStack, Hadoop, Spark, and others. Image: Zscaler Chances are that if you deploy a Linux server online these days and you leave even the tiniest weakness exposed, a cybercrime group will ensnare it as part of its botnet. The latest of these threats is named DreamBus. Analyzed in a report published last week by security firm Zscaler, the company said this new threat is a variant of an older botnet na
  4. A newly discovered worm and botnet named Gitpaste-12 lives on GitHub and also uses Pastebin to host malicious code. The advanced malware comes equipped with reverse shell and crypto-mining capabilities and exploits over 12 known vulnerabilities, therefore the moniker. Spreads via GitHub, attacks in 12 different ways Gitpaste-12 was first detected by Juniper Threat Labs lurking on GitHub around October 15th. However, commits reveal the malware has lived on GitHub since Jul 9th, 2020 until its shut down after Oct 27th, 2020.
  5. The Qbot botnet uses a new template for the distribution of their malware that uses a fake Windows Defender Antivirus theme to trick you into enabling Excel macros. Qbot, otherwise known as QakBot or QuakBot, is Windows malware that steals bank credentials, Windows domain credentials, and provides remote access to threat actors who install ransomware. Victims usually become infected with Qbot through another malware infection or via phishing campaigns using various lures, including fake invoices, payment and banking information, scanned documents, or
  6. New P2P botnet infects SSH servers all over the world Botnet is hard to detect and with no centralized control server, harder to take down. Enlarge Aurich Lawson 87 with 46 posters participating Researchers have found what they believe is a previously undiscovered botnet that uses unusually advanced measures to covertly target millions of servers around the world. The botnet uses proprietary software written from scratch to infect servers and corral them into a peer-to-peer network, resear
  7. Botnet redirects hijacked traffic to over 50 active phishing sites. Over 100,000 routers have had their DNS settings modified to redirect users to phishing pages. The redirection occurs only when users are trying to access e-banking pages for Brazilian banks. Around 88% of these routers are located in Brazil, and the campaign has been raging since at least mid-August when security firm Radware first spotted something strange. But according to a new report published last week by Chinese cyber-security firm Qihoo 360, the group behind these attacks
  8. Hello guys, I found this article very interesting as it target android devices.. Souces from here: black-rose-lucy-the-latest-russian-maas-botnet Good reading
  9. Emotet botnet resumes malspam operations after going silent for nearly four months. Emotet, one of today's largest and most dangerous malware botnets, has returned to life after a period of inactivity that lasted nearly four months, since the end of May this year. During that time, the botnet's command and control (C&C) servers had been shut down, and Emotet stopped sending out commands to infected infected bots, and new email spam campaigns to infect new victims. Some security researchers hoped that law enforcement had secretly found a way
  10. ‘Satori’ IoT Botnet Operator Pleads Guilty A 21-year-old man from Vancouver, Wash. has pleaded guilty to federal hacking charges tied to his role in operating the “Satori” botnet, a crime machine powered by hacked Internet of Things (IoT) devices that was built to conduct massive denial-of-service attacks targeting Internet service providers, online gaming platforms and Web hosting companies. Kenneth “Nexus-Zeta” Schuchman, in an undated photo. Kenneth Currin Schuchman pleaded guilty to one count of aiding and abetting computer intrusions. Between Jul
  11. It sounds like something out of a hacking movie: slow heavy metal music plays while the hero goes to town on their keyboard, green text and 3d imagery flashing by. He explains to his partner that he’s going to take the botnet down from the inside; the infected computers will cure themselves. They hit the Enter key like it insulted someone’s mother. The over-sized screen, covered in red dots, slowly starts to turn white. The virus is clear. The real-life version didn’t happen quite like that, but it might not be far off: French police hijacked and then cleared a botnet with nearly a million inf
  12. Gafgyt has been updated with new capabilities, and it spreads by killing rival malware. Tens of thousands of Wi-Fi routers are potentially vulnerable to an updated form of malware which takes advantage of known vulnerabilities to rope these devices into a botnet for the purposes of selling distributed denial of service (DDoS) attack capabilities to cyber criminals. A new variant of Gafgyt malware – which first emerged in 2014 – targets small office and home routers from well known brands, gaining access to the devices via known vulnerabilities. Now th
  13. A huge wave of attacks is targeting home routers in South Africa for recruitment into a Hakai-based botnet. A new malware campaign is attempting to build a bigger botnet, and it's raising warning flags for its attack vector — and the location of the victims. According to NetScout, IoT honeypots run by its ATLAS Security Engineering & Response Team (ASERT) saw, from April 22 to May 10, a 5,043% increase of exploit attempts that originated in Egypt and targeted consumer routers in South Africa. The attacks, with a payload that attempted to recruit
  14. A relatively new botnet called Echobot has grown to 26 the number of exploits it uses to propagate. Most of the exploitation code it includes is for unpatched IoT devices, but enterprise apps Oracle WebLogic and VMware SD-Wan are among the targets, too. Echobot is based on Mirai malware, like hundreds of other botnets that emerged once the source code became publicly available. It was first disclosed (https://unit42.paloaltonetworks.com/new-mirai-variant-adds-8-new-exploits-targets-additional-iot-devices/) earlier this month by researchers at Palo Alto Networks,
  15. Security researchers have discovered an ongoing sophisticated botnet campaign that is currently brute-forcing more than 1.5 million publicly accessible Windows RDP servers on the Internet. Dubbed GoldBrute, the botnet scheme has been designed in a way to escalate gradually by adding every new cracked system to its network, forcing them to further find new available RDP servers and then brute force them. To fly under the radar of security tools and malware analysts, attackers behind this campaign command each infected machine to target millions of servers with a uni
  16. Several botnet operators are targeting a popular but vulnerable fiber router, which can be easily hijacked thanks to two authentication bypass and command injection bugs. ZDNet first reported the bugs last week. In case you missed it: two bugs allowed anyone to bypass the router's login page and access pages within -- simply by adding "?images/" to the end of the web address on any of the router's configuration pages. With near complete access to the router, an attacker can inject their own commands, running with the highest "root" privileges. In other words, these rout
  17. Security researchers have discovered the first IoT botnet malware strain that can survive device reboots and remain on infected devices after the initial compromise. This is a major game-changing moment in the realm of IoT and router malware. Until today, equipment owners could always remove IoT malware from their smart devices, modems, and routers by resetting the device. The reset operation flushed the device's flash memory, where the device would keep all its working data, including IoT malware strains. "Hide and Seek" malware copies itself to /etc/init.d/ B
  18. Infamous IoT menace lives on in its hellspawn Cybercrooks are using the infamous Mirai IoT botnet as a framework to quickly add in new exploits and functionalities, it has emerged. The tactic is dramatically decreasing the development time for new botnets, according to research from Netscout's Arbor Security Engineering and Response Team (ASERT). The work looks at four Mirai variants – Satori, JenX, OMG and Wicked – to illustrate how their authors have built upon Mirai and added their own flair: Satori leveraged remote code injection exploits t
  19. Tor is still DHE 1024 (NSA crackable) After more revelations, and expert analysis, we still aren't precisely sure what crypto the NSA can break. But everyone seems to agree that if anything, the NSA can break 1024 RSA/DH keys. Assuming no "breakthroughs", the NSA can spend $1 billion on custom chips that can break such a key in a few hours. We know the NSA builds custom chips, they've got fairly public deals with IBM foundries to build chips. The problem with Tor is that it still uses these 1024 bit keys for much of its crypto, particularly because most people are still using older versions o
  • Create New...