Germany Sinkholes Botnet of 30,000 BadBox-Infected Devices

December 13, 2024 at 06:26AM Germany’s Federal Office for Information Security reported that over 30,000 media devices sold with pre-installed BadBox malware became part of a botnet. The agency has disrupted communication between infected devices and their command servers, advising users to disconnect and scan devices, while working with internet providers to address the issue. … Read more

Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices

December 9, 2024 at 07:07AM A botnet named Socks5Systemz operates the malicious proxy service PROXY.AM, enabling cybercriminals to mask their activities. Recent findings reveal its resurgence after losing control of its initial version. Meanwhile, the Gafgyt malware targets misconfigured Docker API servers, emphasizing the risks of cloud misconfigurations and the need for better security practices. … Read more

Russian Script Kiddie Assembles Massive DDoS Botnet

November 27, 2024 at 09:08AM A hacker known as “Matrix” has created a DDoS botnet using publicly available malware tools, targeting IoT devices and enterprise servers. Operating on Telegram, Matrix offers various DDoS attack plans. Researchers emphasize the need for improved security practices to address vulnerabilities being exploited, particularly default credentials and unpatched systems. ### … Read more

Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign

November 27, 2024 at 01:04AM A threat actor named Matrix has initiated a large-scale DDoS campaign by exploiting vulnerabilities in IoT devices, primarily targeting IP addresses in China and Japan. This operation utilizes publicly available scripts, promotes a DDoS-for-hire service via Telegram, and highlights the need for improved security practices to mitigate such attacks. **Meeting … Read more

Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices

November 18, 2024 at 04:27AM Water Barghest, estimated to control over 20,000 IoT devices by October 2024, exploits vulnerabilities to monetize them as proxies on a marketplace. Utilizing automated scripts and the Ngioweb malware, the process from infection to marketplace availability can be completed in under 10 minutes, highlighting its operational efficiency. **Meeting Notes Takeaways: … Read more

China’s Volt Typhoon Rebuilding Botnet

November 13, 2024 at 07:21AM Security researchers report that China’s Volt Typhoon botnet has re-emerged, utilizing the same core infrastructure and techniques as before. This development highlights ongoing cybersecurity threats linked to the botnet’s resurgence. **Meeting Takeaways:** 1. **Botnet Activity**: The botnet associated with China’s Volt Typhoon has recently resurfaced. 2. **Techniques and Infrastructure**: It … Read more

China’s Volt Typhoon crew and its botnet surge back with a vengeance

November 12, 2024 at 08:01PM China’s Volt Typhoon cyber group has resurfaced, compromising outdated Cisco and Netgear routers to target critical U.S. infrastructure, sparking cyberattacks. Despite previous claims of dismantling the botnet, researchers report increased sophistication, with breaches extending to Singapore Telecommunications. The resurgence highlights rising Chinese cyber espionage threats globally. ### Meeting Takeaways on … Read more

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

November 8, 2024 at 09:58AM The AndroxGh0st malware is now exploiting various security vulnerabilities in internet-facing applications while incorporating the Mozi botnet for persistent access and credential theft. This integration enhances its targeting capabilities, allowing it to infect more IoT devices and streamline operations within a shared command infrastructure. ### Meeting Takeaways – November 8, … Read more

German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested

November 4, 2024 at 07:39AM German authorities disrupted dstat[.]cc, a platform enabling simplified DDoS attacks for users with minimal technical skills. The Federal Criminal Police Office (BKA) highlighted its role in assessing attack capabilities. Two suspects, involved in drug trafficking via an online platform, were arrested. This action is part of the ongoing PowerOFF operation. … Read more

Microsoft Warns of Chinese Botnet Exploiting Router Flaws for Credential Theft

November 1, 2024 at 06:27AM Microsoft has identified a Chinese threat actor, Storm-0940, using a botnet named Quad7 (CovertNetwork-1658) to conduct sophisticated password spray attacks targeting organizations in North America and Europe. This botnet exploits security flaws in routers to gain access, facilitating credential theft and further cyber exploitation. ### Meeting Takeaways – November 01, … Read more