Archive for the ‘Botnet’ Category

Dark Nexus: A New Emerging IoT Botnet Malware Spotted in the Wild

April 8th, 2020
Cybersecurity researchers have discovered a new emerging IoT botnet threat that leverages compromised smart devices to stage 'distributed denial-of-service' attacks, potentially triggered on-demand through platforms offering DDoS-for-hire services. The botnet, named "dark_nexus" by Bitdefender researchers, works by employing credential stuffing attacks against a variety of devices, such as

Posted in Botnet, botnet malware, Cyber Attack, ddos attack, DDoS booters, IoT botnet, secure smart devices | Comments (0)

Mukashi: A New Mirai IoT Botnet Variant Targeting Zyxel NAS Devices

March 21st, 2020
A new version of the infamous Mirai botnet is exploiting a recently uncovered critical vulnerability in network-attached storage (NAS) devices in an attempt to remotely infect and control vulnerable machines. Called "Mukashi," the new variant of the malware employs brute-force attacks using different combinations of default credentials to log into Zyxel NAS, UTM, ATP, and VPN firewall

Posted in Botnet, brute force attack, Cyber Attack, firewall, Malware attack, mirai, mirai botnet, NAS devices, Vulnerability | Comments (0)

Multiple DDoS Botnets Exploited 0-Day Flaws in LILIN DVR Surveillance Systems

March 21st, 2020
Multiple zero-day vulnerabilities in digital video recorders (DVRs) for surveillance systems manufactured by Taiwan-based LILIN have been exploited by botnet operators to infect and co-opt vulnerable devices into a family of denial-of-service bots. The findings come from Chinese security firm Qihoo 360's Netlab team, who say different attack groups have been using LILIN DVR zero-day

Posted in Botnet, Botnet attack, malware, Malware attack, surveillance program | Comments (0)

Microsoft Hijacks Necurs Botnet that Infected 9 Million PCs Worldwide

March 10th, 2020
Microsoft today announced that it has successfully disrupted the botnet network of the Necurs malware, which has infected more than 9 million computers globally, and also hijacked the majority of its infrastructure. The latest botnet takedown was the result of a coordinated operation involving international police and private tech companies across 35 countries. The operation was conducted

Posted in Botnet, Botnet attack, botnet malware, cyber security, microsoft, Necurs Botnet, Necurs rootkit, Spam botnet | Comments (0)

14 Ways to Evade Botnet Malware Attacks On Your Computers

December 18th, 2019
Cybercriminals are busy innovators, adapting their weapons and attack strategies, and ruthlessly roaming the web in search of their next big score. Every manner of sensitive information, such as confidential employee records, customers' financial data, protected medical documents, and government files, are all subject to their relentless threats to cybersecurity. Solutions span a broad

Posted in Botnet, Botnet attack, botnet malware, Cyber Attack, email security, malware detection, network monitoring software, network security, network security software | Comments (0)

Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers

October 16th, 2019
A decade-old botnet malware that currently controls over 450,000 computers worldwide has recently shifted its operations from infecting machines with ransomware or crypto miners to abusing them for sending out sextortion emails to millions of innocent people. Extortion by email is growing significantly, with a large number of users recently complaining about receiving sextortion emails that

Posted in Botnet, Cyber Attack, cyber security, Cyber threats, email scam, email security, email spam, Phorpiex Botnet | Comments (0)

Smominru Botnet Indiscriminately Hacked Over 90,000 Computers Just Last Month

September 18th, 2019
Insecure Internet-connected devices have aided different types of cybercrime for years, most common being DDoS and spam campaigns. But cybercriminals have now shifted toward a profitable scheme where botnets do not just launch DDoS or spam—they mine cryptocurrencies as well. Smominru, an infamous cryptocurrency-mining and credential-stealing botnet, has become one of the rapidly spreading

Posted in Botnet, EternalBlue exploit, hacking news, Malware attack, malware protection software | Comments (0)

FBI Mapping ‘Joanap Malware’ Victims to Disrupt the North Korean Botnet

January 31st, 2019
The United States Department of Justice (DoJ) announced Wednesday its effort to "map and further disrupt" a botnet tied to North Korea that has infected numerous Microsoft Windows computers across the globe over the last decade. Dubbed Joanap, the botnet is believed to be part of "Hidden Cobra"—an Advanced Persistent Threat (APT) actors' group often known as Lazarus Group and Guardians of

Posted in Botnet, Brambul malware, Cyber Attack, FBI, Hidden Cobra Hackers, Joanap botnet, Lazarus Group, malware, North Korea, North Korean hackers | Comments (0)

FBI, Air Force investigators mapped North Korean botnet to aid shutdown

January 31st, 2019
Stylized photograph of a suspicious character at a laptop.

Enlarge / Computer Hacker (credit: ilkaydede / iStock / GettyImages)

On January 30, the US Department of Justice announced that it, the Federal Bureau of Investigation, and the Air Force Office of Special Investigations were engaged in a campaign to "map and further disrupt" a botnet tied to North Korean intelligence activities detailed in an indictment unsealed last September. Search warrants obtained by the FBI and AFOSI allowed the agencies to essentially join the botnet, creating servers that mimicked the beacons of the malware.

"While the Joanap botnet was identified years ago and can be defeated with antivirus software," said United States Attorney Nick Hanna, "we identified numerous unprotected computers that hosted the malware underlying the botnet. The search warrants and court orders announced today as part of our efforts to eradicate this botnet are just one of the many tools we will use to prevent cybercriminals from using botnets to stage damaging computer intrusions.”

Joanap is a remote access tool (RAT) identified as part of "Hidden Cobra", the Department of Homeland Security designator for the North Korean hacking operation also known as the Lazarus Group. The same group has been tied to the WannaCry worm and the hacking of Sony Motion Pictures. Joanap's spread dates back to 2009, when it was distributed by Brambul, a Server Message Block (SMB) file-sharing protocol worm. Joanap and Brambul were recovered from computers of the victims of the campaigns listed in the indictment of Park Jin Hyok in September.

Read 4 remaining paragraphs | Comments

Posted in Biz & IT, Botnet, DOJ, FBI, hidden cobra, Lazarus Group, North Korea, Policy, usdoj | Comments (0)

Ukrainian Police Arrest 6 Hackers Linked to DDoS and Financial Attacks

January 17th, 2019
Ukrainian Police have this week busted out two separate groups of hackers involved in carrying out DDoS attacks against news agencies and stealing money from Ukrainian citizens, respectively. According to the authorities, the four suspected hackers they arrested last week, all aged from 26 to 30 years, stole more than 5 million Hryvnia (around 178,380 USD) from the bank accounts of Ukrainian

Posted in bank hacking, Botnet, Cyber Attack, ddos attack, hacker arrested, hacking news, malware, Ukraine, Ukrainian hacker | Comments (0)