Cyberveilleby Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
16 résultats taggé Botnet  ✕
Prometei botnet improves modules and exhibits new capabilities in recent updates https://blog.talosintelligence.com/prometei-botnet-improves/
13/03/2023 20:51:59
QRCode
archive.org
thumbnail

The high-profile botnet, focused on mining cryptocurrency, is back with new Linux versions.

talosintelligence EN 2023 Prometei botnet analysis
GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers https://unit42.paloaltonetworks.com/gobruteforcer-golang-botnet/
13/03/2023 20:01:14
QRCode
archive.org
thumbnail

New Golang-based malware we have dubbed GoBruteforcer targets web servers. Golang is becoming popular with malware programmers due to its versatility.

unit42 EN 2023 Golang paloaltonetworks Botnet GoBruteforcer web servers
Accidentally Crashing a Botnet https://www.akamai.com/blog/security-research/kmsdbot-part-two-crashing-a-botnet
15/01/2023 16:15:38
QRCode
archive.org
thumbnail

As part of our research into the cryptomining botnet kmsdbot, we rendered it useless.

akamai EN 2022 Security-Research Research Bot-Attacks DDOS Bot-Attacks Cyber-Security Research Security-Research Kmsdbot botnet SIRT cryptomining crash malware
Raspberry Robin's botnet second life https://blog.sekoia.io/raspberry-robins-botnet-second-life/
10/01/2023 20:52:19
QRCode
archive.org
thumbnail

Raspberry Robin appears to be a type of Pay-Per-Install botnet, likely to be used by cybercriminals to distribute other malware.

sekoia EN 2023 RaspberryRobin Pay-Per-Install botnet cybercriminals malware
GoTrim: Go-based Botnet Actively Brute Forces WordPress Websites https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites
19/12/2022 11:05:36
QRCode
archive.org
thumbnail

FortiGuard Labs encountered an unreported CMS scanner and brute forcer written in the Go programming language. Read our analysis of the malware and how this active botnet scans and compromises websites.

fortinet EN 2022 analysis malware scanner Wordpress go brute-force-attack FortiGuards-Labs Threat-Research botnet
Zerobot – New Go-Based Botnet Campaign Targets Multiple Vulnerabilities https://www.fortinet.com/blog/threat-research/zerobot-new-go-based-botnet-campaign-targets-multiple-vulnerabilities
06/12/2022 22:38:53
QRCode
archive.org
thumbnail

FortiGuardLabs examines a botnet known as Zerobot written in the Go language targeting IoT vulnerabilities. Read our blog to learn about how it evolves, including self-replication, attacks for different protocols, and self-propagation as well as its behavior once inside an infected device.

fortinet EN 2022 vulnerabilities Botnet iot-security Zerobot Go Threat-Research malware-research malware-analysis
Fodcha Is Coming Back, Raising A Wave of Ransom DDoS https://blog.netlab.360.com/fodcha-is-coming-back-with-rddos/
01/11/2022 20:46:08
QRCode
archive.org

Background
On April 13, 2022, 360Netlab first disclosed the Fodcha botnet. After our
article was published, Fodcha suffered a crackdown from the relevant
authorities, and its authors quickly responded by leaving "Netlab pls leave me
alone I surrender" in an updated sample.No surprise, Fodcha's authors didn't
really stop updating after the fraudulent surrender, and soon a new version was
released.

In the new version, the authors of Fodcha redesigned the communication protocol
and started to us

netlab360 EN 2022 Fodcha botnet DDoS
Archive Sidestepping: Emotet Botnet Pushing Self-Unlocking Password-Protected RAR https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/archive-sidestepping-self-unlocking-password-protected-rar/
22/10/2022 13:11:29
QRCode
archive.org
thumbnail

Trustwave SpiderLabs’ spam traps have identified an increase in threats packaged in password-protected archives with about 96% of these being spammed by the Emotet Botnet. In the first half of 2022, we identified password-protected ZIP files as the third most popular archive format used by cybercriminals to conceal malware.

trustwave en 2022 Emotet botnet self-unlocking rar analysis spam archives
Mēris botnet, climbing to the record https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/
19/08/2022 11:21:23
QRCode
archive.org

End of June 2021, Qrator Labs started to see signs of a new assaulting force on the Internet – a botnet of a new kind. That is a joint research we conducted together with Yandex to elaborate on the specifics of the DDoS attacks enabler emerging in almost real-time.

qrator EN 2021 DDoS botnet Analysis
A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information https://blog.netlab.360.com/a-new-botnet-orchard-generates-dga-domains-with-bitcoin-transaction-information/
09/08/2022 13:07:41
QRCode
archive.org

DGA is one of the classic techniques for botnets to hide their C2s, attacker
only needs to selectively register a very small number of C2 domains, while for
the defenders, it is difficult to determine in advance which domain names will
be generated and registered.

netlab360 EN 2022 Orchard botnet C2 bitcoin domains
So RapperBot, What Ya Bruting For? https://www.fortinet.com/blog/threat-research/rapperbot-malware-discovery
07/08/2022 21:24:01
QRCode
archive.org
thumbnail

In June 2022, FortiGuard Labs encountered IoT malware samples with SSH-related strings, something not often seen in other IoT threat campaigns. What piqued our interest more was the size of the code referencing these strings in relation to the code used for DDoS attacks, which usually comprises most of the code in other variants.

fortinet EN 2022 RapperBot research threat IoT Mirai SSH-2.0-HELLOWORLD botnet
Meet the Administrators of the RSOCKS Proxy Botnet https://krebsonsecurity.com/2022/06/meet-the-administrators-of-the-rsocks-proxy-botnet/
23/06/2022 20:32:13
QRCode
archive.org

Authorities in the United States, Germany, the Netherlands and the U.K. last week said they dismantled the "RSOCKS" botnet, a collection of millions of hacked devices that were sold as "proxies" to cybercriminals looking for ways to route their malicious…

krebsonsecurity EN 2022 RSOCKS botnet devices dismantled
Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior https://www.nisos.com/blog/fronton-botnet-report/
28/05/2022 22:41:57
QRCode
archive.org
thumbnail

May 2022 Investigative Report Release: Nisos analysts determined that Fronton is a system developed for coordinated inauthentic behavior on a massive scale. Read more.
document

Nisos EN 2022 botnet report fronton
Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices - Microsoft Security Blog https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/
23/05/2022 09:26:34
QRCode
archive.org
thumbnail

Observing a 254% increase in activity over the last six months from a versatile Linux trojan called XorDdos, the Microsoft 365 Defender research team provides in-depth analysis into this stealthy malware's capabilities and key infection signs.

microsoft-security-blog 2022 EN Linux XorDdos botnet malware stealthy
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure https://www.microsoft.com/security/blog/2021/07/22/when-coin-miners-evolve-part-1-exposing-lemonduck-and-lemoncat-modern-mining-malware-infrastructure/
24/04/2022 10:58:21
QRCode
archive.org
thumbnail

In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covers the evolution of the threat, how it spreads, and how it impacts organizations. Part 2 is a deep dive on the attacker behavior and will provide investigation guidance.

microsoft 2021 LemonDuck lemoncat EN malware botnet infrastructure
FritzFrog: P2P Botnet Hops Back on the Scene https://www.akamai.com/blog/security/fritzfrog-p2p
11/02/2022 18:37:08
QRCode
archive.org

FritzFrog is a peer-to-peer botnet, which means its command and control server is not limited to a single, centralized machine, but rather can be done from every machine in its distributed network. In other words, every host running the malware process becomes part of the network, and is capable of sending, receiving, and executing the commands to control machines in the network.

FritzFrog botnet EN Akamai
1185 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn - Curated by Decio