#botnet search results

Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops cyble.com/blog/lunobotne… #Linux #botnet

0xor0ne's tweet image. Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops

cyble.com/blog/lunobotne…

#Linux #botnet
0xor0ne's tweet image. Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops

cyble.com/blog/lunobotne…

#Linux #botnet

🚨 #Darkweb Leak — #VIPER Multi-OS #Botnet v1.0.1 allegedly shared A forum post claims a FUD, multi-OS (#Windows #macOS #Linux) botnet with exploit modules. Handle with extreme caution — for #MalwareAnalysts & defenders only. #CyberSecurity

cyberfeeddigest's tweet image. 🚨 #Darkweb Leak — #VIPER Multi-OS #Botnet v1.0.1 allegedly shared

A forum post claims a FUD, multi-OS (#Windows #macOS #Linux) botnet with exploit modules. Handle with extreme caution — for #MalwareAnalysts & defenders only. #CyberSecurity

🚨#Opendir #botnet🚨 http://176.113.115.7/files/ ⚠️#Redline #Stealer ☣️C2C hosting with several pieces of malware per folder. 🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)

ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)
ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)
ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)

Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

abuse_ch's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

neurasoftdev's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

🕷️ Underground Market Exposed: Clear Web Selling Cybercrime Tools A website openly offers #BOTNET, #Crypters, #Exploits, Keyloggers & #RAT tools 🚨 URL (DEFANGED): hxxps://www.darkexploits[.]is/product-category/rat/ #Cybercrime #Darkweb

cyberfeeddigest's tweet image. 🕷️ Underground Market Exposed: Clear Web Selling Cybercrime Tools

A website openly offers #BOTNET, #Crypters, #Exploits, Keyloggers & #RAT tools 🚨
URL (DEFANGED): hxxps://www.darkexploits[.]is/product-category/rat/
#Cybercrime #Darkweb

Analyze DSLRoot Proxy Network & IP Addresses #Malware #BotNet infrawatch.app/blog/dslroot-u…

blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…
blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…
blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…

#BOTNET pues ya está, a jugar al sudoku todo el mundo 😂

BTshell's tweet image. #BOTNET pues ya está, a jugar al sudoku todo el mundo 😂
BTshell's tweet image. #BOTNET pues ya está, a jugar al sudoku todo el mundo 😂
BTshell's tweet image. #BOTNET pues ya está, a jugar al sudoku todo el mundo 😂

MystRodX: The Covert Dual-Mode Backdoor Threat #botnet blog.xlab.qianxin.com/mystrodx_cover…

blackorbird's tweet image. MystRodX: The Covert Dual-Mode Backdoor Threat #botnet
blog.xlab.qianxin.com/mystrodx_cover…

🧪 'Poison Tools' Exposed – Clearweb Site Selling #RATs, #Stealers & More A clearweb site is openly offering #Botnet, #Ransomware, #Crypter, #Exploit kits, #SpammingTools & various versions of #CRAXRAT, #REDLINE. Site: hxxps://poisonsoftwares[.]com/ #CyberCrime #Malware

cyberfeeddigest's tweet image. 🧪 'Poison Tools' Exposed – Clearweb Site Selling #RATs, #Stealers & More

A clearweb site is openly offering #Botnet, #Ransomware, #Crypter, #Exploit kits, #SpammingTools & various versions of #CRAXRAT, #REDLINE.

Site: hxxps://poisonsoftwares[.]com/

#CyberCrime #Malware…

🛑 DarkExploits Marketplace — #BOTNET, #Crypters, #Exploits, #Keyloggers & #RAT for Sale 🛑 A clearweb site hxxps://www[.]darkexploits[.]is/ is openly selling malicious tools, making it a notable source for #Malware analysts. ⚠️ Handle with extreme caution — potential legal &…

cyberfeeddigest's tweet image. 🛑 DarkExploits Marketplace — #BOTNET, #Crypters, #Exploits, #Keyloggers & #RAT for Sale 🛑

A clearweb site hxxps://www[.]darkexploits[.]is/ is openly selling malicious tools, making it a notable source for #Malware analysts.
⚠️ Handle with extreme caution — potential legal &…

🚨 Ermac Banking #Botnet v3.0 Leak 🚨 A site distributing #Hackingtools allegedly shared Ermac Banking Botnet V3.0 — an evolved #Android trojan derived from Cerberus & Hook. It targets 700+ banking, shopping & crypto apps worldwide. #Cybercrime #Malware

cyberfeeddigest's tweet image. 🚨 Ermac Banking #Botnet v3.0 Leak 🚨

A site distributing #Hackingtools allegedly shared Ermac Banking Botnet V3.0 — an evolved #Android trojan derived from Cerberus & Hook. It targets 700+ banking, shopping & crypto apps worldwide.

#Cybercrime #Malware

🚫BadShare: Akamai's new "bad shares" technique can shut down malicious cryptomining botnets. Researchers dropped one operation's hashrate from millions to zero 💸 Read further: technadu.com/zero-hashrate-… #Akamai #Botnet #Cryptomining #Monero #SecurityResearch #Hashrate #BadShare

TechNadu's tweet image. 🚫BadShare: Akamai's new "bad shares" technique can shut down malicious cryptomining botnets. Researchers dropped one operation's hashrate from millions to zero 💸

Read further:
technadu.com/zero-hashrate-…

#Akamai #Botnet #Cryptomining #Monero #SecurityResearch #Hashrate #BadShare

Heu vist el robot Ona repartint 📦 paquets pel Born? ✅ Són proves del projecte #BotNet (@iri_robotics +@carnetbcn + VAIVE Logistics) que està testant l'ús de vehicles elèctrics autònoms en #superilles. Amb el suport de @barcelona_cat @FundlaCaixaCAT. ➡️ upc.edu/ca/sala-de-pre…


#Botnet #IoC 45.144.174.157:38975 103.175.16.200:38975 212.192.6.24:56124 103.136.150.142:56124


New: Reserchers spot new botnet #ShadowV2 which uses misconfigured AWS Docker containers to run a DDoS-for-hire service. Read: hackread.com/shadowv2-botne… #Cybersecurity #Botnet #DDoS #AWS #InfoSec


"Since October 8, 2025, GreyNoise has tracked a coordinated botnet operation involving over 100,000 unique IP addresses from more than 100 countries targeting Remote Desktop Protocol (RDP) services in the United States". #Cybersecurity #BotNet #RDP greynoise.io/blog/botnet-la…


Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

neurasoftdev's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

💥 RondoDox botnet is firing an 'exploit shotgun' at Microsoft Edge vulnerabilities. Is your endpoint security ready? #Botnet #EdgeSecurity ⤵️


#DDoS #Botnet Aisuru Blankets #US #ISPs in Record DDoS ift.tt/JG9jbn8

omvapt's tweet image. #DDoS #Botnet Aisuru Blankets #US #ISPs in Record DDoS 
ift.tt/JG9jbn8

Nuevo botnet peligroso, RondoDox, ataca a nivel mundial a una velocidad incontrolable. ¡Descubre los detalles! #ciberseguridad #botnet exe.io/xrxcd

Leopoldo1048398's tweet image. Nuevo botnet peligroso, RondoDox, ataca a nivel mundial a una velocidad incontrolable. ¡Descubre los detalles! #ciberseguridad #botnet
exe.io/xrxcd

🔹 بوت نت RondoDox يستخدم أسلوب “طلقات الاستغلال العشوائية” شبكة RondoDox Botnet تعتمد على استراتيجية هجومية جديدة تُعرف بـ “Exploit Shotgun” لاستهداف أكبر عدد من الأنظمة في وقت واحد. #RondoDox #Botnet #Malware #CyberThreat

Mshoraty's tweet image. 🔹 بوت نت RondoDox يستخدم أسلوب “طلقات الاستغلال العشوائية”
شبكة RondoDox Botnet تعتمد على استراتيجية هجومية جديدة تُعرف بـ “Exploit Shotgun” لاستهداف أكبر عدد من الأنظمة في وقت واحد.
#RondoDox #Botnet #Malware #CyberThreat

RondoDox insegna che la tecnologia è sia affascinante che inquietante, mentre OpenAI e Microsoft affrontano le loro sfide. #OpenAI #botnet daily.movingwords.it

movingWordsIT's tweet image. RondoDox insegna che la tecnologia è sia affascinante che inquietante, mentre OpenAI e Microsoft affrontano le loro sfide. #OpenAI #botnet daily.movingwords.it

#ThreatProtection Uptick of activity attributed to the #RondoDox #botnet, read more about Symantec's protection: broadcom.com/support/securi… #malware


Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

abuse_ch's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

🪲 Security RondoDox botnet targets 56 n-day flaws across 30+ device types, including Pwn2Own-disclosed bugs. #Botnet #Vulnerabilities #CyberSecurity #IoT

Strivehawk's tweet image. 🪲 Security
RondoDox botnet targets 56 n-day flaws across 30+ device types, including Pwn2Own-disclosed bugs.
#Botnet #Vulnerabilities #CyberSecurity #IoT

🚨 A new RondoDox botnet is actively exploiting 56 n-day flaws in over 30 device types globally, including Pwn2Own bugs! Stay informed. bleepingcomputer.com/news/security/… #RondoDox #Botnet #CyberSecurity #Vulnerability


Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted. C2: hxxp://80[.]251.153.96/ md5:…

0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…
0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…
0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…
0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…

94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet IP resolves to cyberbotne.stresse[.]live Using @ValidinLLC to pivot on base domain, I came across another IP 94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser

raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser
raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser
raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser
raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser

#botnet #iocs! 430 duplicates which means they have been online for a while. and 49 new malware urls! Malware urls/IOC's can be found here: pastebin.com/0QTEJvkX urlhaus.abuse.ch/browse/

banthisguy9349's tweet image. #botnet #iocs!

430 duplicates which means they have been online for a while.
and 49 new malware urls!

Malware urls/IOC's can be found here:
pastebin.com/0QTEJvkX
urlhaus.abuse.ch/browse/

#mirai #botnet 💣69.165.74.77💣💣47.120.60.228💣 Files: -x86 -arm -mpsl -mips -x86_64 -debug.dbg

RacWatchin8872's tweet image. #mirai #botnet
💣69.165.74.77💣💣47.120.60.228💣
Files:
-x86
-arm
-mpsl
-mips
-x86_64
-debug.dbg

IM android botnet #botnet is active. its based in China hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a APK distribution address: hxxps://besa[.]top/test C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html icon_hash="-1153292831" urlscan:…

0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…
0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…
0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…
0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…

⚠️New #Android Banking Botnet Affecting many countries.. C2: hxxp://16.163.253[.122:8020 @LukasStefanko @malwrhunterteam

0x6rss's tweet image. ⚠️New #Android Banking Botnet 
Affecting many countries..
C2: hxxp://16.163.253[.122:8020
@LukasStefanko @malwrhunterteam
0x6rss's tweet image. ⚠️New #Android Banking Botnet 
Affecting many countries..
C2: hxxp://16.163.253[.122:8020
@LukasStefanko @malwrhunterteam
0x6rss's tweet image. ⚠️New #Android Banking Botnet 
Affecting many countries..
C2: hxxp://16.163.253[.122:8020
@LukasStefanko @malwrhunterteam


🚨 #Darkweb Leak — #VIPER Multi-OS #Botnet v1.0.1 allegedly shared A forum post claims a FUD, multi-OS (#Windows #macOS #Linux) botnet with exploit modules. Handle with extreme caution — for #MalwareAnalysts & defenders only. #CyberSecurity

cyberfeeddigest's tweet image. 🚨 #Darkweb Leak — #VIPER Multi-OS #Botnet v1.0.1 allegedly shared

A forum post claims a FUD, multi-OS (#Windows #macOS #Linux) botnet with exploit modules. Handle with extreme caution — for #MalwareAnalysts & defenders only. #CyberSecurity

Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops cyble.com/blog/lunobotne… #Linux #botnet

0xor0ne's tweet image. Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops

cyble.com/blog/lunobotne…

#Linux #botnet
0xor0ne's tweet image. Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops

cyble.com/blog/lunobotne…

#Linux #botnet

🚨#Opendir #botnet🚨 http://176.113.115.7/files/ ⚠️#Redline #Stealer ☣️C2C hosting with several pieces of malware per folder. 🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)

ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)
ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)
ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)

Andromeda #BOTNET (Downloader)

TEAkolik's tweet image. Andromeda #BOTNET (Downloader)
TEAkolik's tweet image. Andromeda #BOTNET (Downloader)
TEAkolik's tweet image. Andromeda #BOTNET (Downloader)

Found another interesting IP on #limenet http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080

raghav127001's tweet image. Found another interesting IP on #limenet

http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080
raghav127001's tweet image. Found another interesting IP on #limenet

http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080

Ever heard of a #botnet? If not, it’s time to pay attention 👀 These massive networks of hacked devices are behind some of the biggest #cyberattacks ever! Let’s break down what botnets are, the most notorious botnets, the massive attacks they’ve executed, and how to keep your…

Resonancesec's tweet image. Ever heard of a #botnet? 
If not, it’s time to pay attention 👀

These massive networks of hacked devices are behind some of the biggest #cyberattacks ever!

Let’s break down what botnets are, the most notorious botnets, the massive attacks they’ve executed, and how to keep your…

Loading...

Something went wrong.


Something went wrong.


United States Trends