#botnet résultats de recherche

Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops cyble.com/blog/lunobotne… #Linux #botnet

0xor0ne's tweet image. Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops

cyble.com/blog/lunobotne…

#Linux #botnet
0xor0ne's tweet image. Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops

cyble.com/blog/lunobotne…

#Linux #botnet

🚨#Opendir #botnet🚨 http://176.113.115.7/files/ ⚠️#Redline #Stealer ☣️C2C hosting with several pieces of malware per folder. 🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)

ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)
ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)
ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)

Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

abuse_ch's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

neurasoftdev's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

🕷️ Underground Market Exposed: Clear Web Selling Cybercrime Tools A website openly offers #BOTNET, #Crypters, #Exploits, Keyloggers & #RAT tools 🚨 URL (DEFANGED): hxxps://www.darkexploits[.]is/product-category/rat/ #Cybercrime #Darkweb

cyberfeeddigest's tweet image. 🕷️ Underground Market Exposed: Clear Web Selling Cybercrime Tools

A website openly offers #BOTNET, #Crypters, #Exploits, Keyloggers & #RAT tools 🚨
URL (DEFANGED): hxxps://www.darkexploits[.]is/product-category/rat/
#Cybercrime #Darkweb

Analyze DSLRoot Proxy Network & IP Addresses #Malware #BotNet infrawatch.app/blog/dslroot-u…

blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…
blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…
blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…

#BOTNET pues ya está, a jugar al sudoku todo el mundo 😂

BTshell's tweet image. #BOTNET pues ya está, a jugar al sudoku todo el mundo 😂
BTshell's tweet image. #BOTNET pues ya está, a jugar al sudoku todo el mundo 😂
BTshell's tweet image. #BOTNET pues ya está, a jugar al sudoku todo el mundo 😂

MystRodX: The Covert Dual-Mode Backdoor Threat #botnet blog.xlab.qianxin.com/mystrodx_cover…

blackorbird's tweet image. MystRodX: The Covert Dual-Mode Backdoor Threat #botnet
blog.xlab.qianxin.com/mystrodx_cover…

🚨 Ermac Banking #Botnet v3.0 Leak 🚨 A site distributing #Hackingtools allegedly shared Ermac Banking Botnet V3.0 — an evolved #Android trojan derived from Cerberus & Hook. It targets 700+ banking, shopping & crypto apps worldwide. #Cybercrime #Malware

cyberfeeddigest's tweet image. 🚨 Ermac Banking #Botnet v3.0 Leak 🚨

A site distributing #Hackingtools allegedly shared Ermac Banking Botnet V3.0 — an evolved #Android trojan derived from Cerberus & Hook. It targets 700+ banking, shopping & crypto apps worldwide.

#Cybercrime #Malware

🚨 #Darkweb Leak — #VIPER Multi-OS #Botnet v1.0.1 allegedly shared A forum post claims a FUD, multi-OS (#Windows #macOS #Linux) botnet with exploit modules. Handle with extreme caution — for #MalwareAnalysts & defenders only. #CyberSecurity

cyberfeeddigest's tweet image. 🚨 #Darkweb Leak — #VIPER Multi-OS #Botnet v1.0.1 allegedly shared

A forum post claims a FUD, multi-OS (#Windows #macOS #Linux) botnet with exploit modules. Handle with extreme caution — for #MalwareAnalysts & defenders only. #CyberSecurity

🧪 'Poison Tools' Exposed – Clearweb Site Selling #RATs, #Stealers & More A clearweb site is openly offering #Botnet, #Ransomware, #Crypter, #Exploit kits, #SpammingTools & various versions of #CRAXRAT, #REDLINE. Site: hxxps://poisonsoftwares[.]com/ #CyberCrime #Malware

cyberfeeddigest's tweet image. 🧪 'Poison Tools' Exposed – Clearweb Site Selling #RATs, #Stealers & More

A clearweb site is openly offering #Botnet, #Ransomware, #Crypter, #Exploit kits, #SpammingTools & various versions of #CRAXRAT, #REDLINE.

Site: hxxps://poisonsoftwares[.]com/

#CyberCrime #Malware…

Heu vist el robot Ona repartint 📦 paquets pel Born? ✅ Són proves del projecte #BotNet (@iri_robotics +@carnetbcn + VAIVE Logistics) que està testant l'ús de vehicles elèctrics autònoms en #superilles. Amb el suport de @barcelona_cat @FundlaCaixaCAT. ➡️ upc.edu/ca/sala-de-pre…


🛑 DarkExploits Marketplace — #BOTNET, #Crypters, #Exploits, #Keyloggers & #RAT for Sale 🛑 A clearweb site hxxps://www[.]darkexploits[.]is/ is openly selling malicious tools, making it a notable source for #Malware analysts. ⚠️ Handle with extreme caution — potential legal &…

cyberfeeddigest's tweet image. 🛑 DarkExploits Marketplace — #BOTNET, #Crypters, #Exploits, #Keyloggers & #RAT for Sale 🛑

A clearweb site hxxps://www[.]darkexploits[.]is/ is openly selling malicious tools, making it a notable source for #Malware analysts.
⚠️ Handle with extreme caution — potential legal &…

Apparently, this #Mirai threat actor was feeling creative when registering the #botnet C2 domain names! 🤦 Mirai sample: 👉 bazaar.abuse.ch/sample/2e82e8d… Botnet C2 domains: 📡 threatfox.abuse.ch/browse/malware…

abuse_ch's tweet image. Apparently, this #Mirai threat actor was feeling creative when registering the #botnet C2 domain names! 🤦

Mirai sample:
👉 bazaar.abuse.ch/sample/2e82e8d…

Botnet C2 domains:
📡 threatfox.abuse.ch/browse/malware…

#Botnet #IoC 45.144.174.157:38975 103.175.16.200:38975 212.192.6.24:56124 103.136.150.142:56124


🚫BadShare: Akamai's new "bad shares" technique can shut down malicious cryptomining botnets. Researchers dropped one operation's hashrate from millions to zero 💸 Read further: technadu.com/zero-hashrate-… #Akamai #Botnet #Cryptomining #Monero #SecurityResearch #Hashrate #BadShare

TechNadu's tweet image. 🚫BadShare: Akamai's new "bad shares" technique can shut down malicious cryptomining botnets. Researchers dropped one operation's hashrate from millions to zero 💸

Read further:
technadu.com/zero-hashrate-…

#Akamai #Botnet #Cryptomining #Monero #SecurityResearch #Hashrate #BadShare

"Since October 8, 2025, GreyNoise has tracked a coordinated botnet operation involving over 100,000 unique IP addresses from more than 100 countries targeting Remote Desktop Protocol (RDP) services in the United States". #Cybersecurity #BotNet #RDP greynoise.io/blog/botnet-la…


Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

neurasoftdev's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

💥 RondoDox botnet is firing an 'exploit shotgun' at Microsoft Edge vulnerabilities. Is your endpoint security ready? #Botnet #EdgeSecurity ⤵️


#DDoS #Botnet Aisuru Blankets #US #ISPs in Record DDoS ift.tt/JG9jbn8

omvapt's tweet image. #DDoS #Botnet Aisuru Blankets #US #ISPs in Record DDoS 
ift.tt/JG9jbn8

Nuevo botnet peligroso, RondoDox, ataca a nivel mundial a una velocidad incontrolable. ¡Descubre los detalles! #ciberseguridad #botnet exe.io/xrxcd

Leopoldo1048398's tweet image. Nuevo botnet peligroso, RondoDox, ataca a nivel mundial a una velocidad incontrolable. ¡Descubre los detalles! #ciberseguridad #botnet
exe.io/xrxcd

🔹 بوت نت RondoDox يستخدم أسلوب “طلقات الاستغلال العشوائية” شبكة RondoDox Botnet تعتمد على استراتيجية هجومية جديدة تُعرف بـ “Exploit Shotgun” لاستهداف أكبر عدد من الأنظمة في وقت واحد. #RondoDox #Botnet #Malware #CyberThreat

Mshoraty's tweet image. 🔹 بوت نت RondoDox يستخدم أسلوب “طلقات الاستغلال العشوائية”
شبكة RondoDox Botnet تعتمد على استراتيجية هجومية جديدة تُعرف بـ “Exploit Shotgun” لاستهداف أكبر عدد من الأنظمة في وقت واحد.
#RondoDox #Botnet #Malware #CyberThreat

RondoDox insegna che la tecnologia è sia affascinante che inquietante, mentre OpenAI e Microsoft affrontano le loro sfide. #OpenAI #botnet daily.movingwords.it

movingWordsIT's tweet image. RondoDox insegna che la tecnologia è sia affascinante che inquietante, mentre OpenAI e Microsoft affrontano le loro sfide. #OpenAI #botnet daily.movingwords.it

#ThreatProtection Uptick of activity attributed to the #RondoDox #botnet, read more about Symantec's protection: broadcom.com/support/securi… #malware


Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

abuse_ch's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

🪲 Security RondoDox botnet targets 56 n-day flaws across 30+ device types, including Pwn2Own-disclosed bugs. #Botnet #Vulnerabilities #CyberSecurity #IoT

Strivehawk's tweet image. 🪲 Security
RondoDox botnet targets 56 n-day flaws across 30+ device types, including Pwn2Own-disclosed bugs.
#Botnet #Vulnerabilities #CyberSecurity #IoT

🚨 A new RondoDox botnet is actively exploiting 56 n-day flaws in over 30 device types globally, including Pwn2Own bugs! Stay informed. bleepingcomputer.com/news/security/… #RondoDox #Botnet #CyberSecurity #Vulnerability


Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted. C2: hxxp://80[.]251.153.96/ md5:…

0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…
0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…
0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…
0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…

94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet IP resolves to cyberbotne.stresse[.]live Using @ValidinLLC to pivot on base domain, I came across another IP 94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser

raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser
raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser
raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser
raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser

#mirai #botnet 💣69.165.74.77💣💣47.120.60.228💣 Files: -x86 -arm -mpsl -mips -x86_64 -debug.dbg

RacWatchin8872's tweet image. #mirai #botnet
💣69.165.74.77💣💣47.120.60.228💣
Files:
-x86
-arm
-mpsl
-mips
-x86_64
-debug.dbg

#botnet #iocs! 430 duplicates which means they have been online for a while. and 49 new malware urls! Malware urls/IOC's can be found here: pastebin.com/0QTEJvkX urlhaus.abuse.ch/browse/

banthisguy9349's tweet image. #botnet #iocs!

430 duplicates which means they have been online for a while.
and 49 new malware urls!

Malware urls/IOC's can be found here:
pastebin.com/0QTEJvkX
urlhaus.abuse.ch/browse/

IM android botnet #botnet is active. its based in China hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a APK distribution address: hxxps://besa[.]top/test C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html icon_hash="-1153292831" urlscan:…

0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…
0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…
0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…
0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…

⚠️New #Android Banking Botnet Affecting many countries.. C2: hxxp://16.163.253[.122:8020 @LukasStefanko @malwrhunterteam

0x6rss's tweet image. ⚠️New #Android Banking Botnet 
Affecting many countries..
C2: hxxp://16.163.253[.122:8020
@LukasStefanko @malwrhunterteam
0x6rss's tweet image. ⚠️New #Android Banking Botnet 
Affecting many countries..
C2: hxxp://16.163.253[.122:8020
@LukasStefanko @malwrhunterteam
0x6rss's tweet image. ⚠️New #Android Banking Botnet 
Affecting many countries..
C2: hxxp://16.163.253[.122:8020
@LukasStefanko @malwrhunterteam


🚨#Opendir #botnet🚨 http://176.113.115.7/files/ ⚠️#Redline #Stealer ☣️C2C hosting with several pieces of malware per folder. 🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)

ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)
ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)
ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)

Andromeda #BOTNET (Downloader)

TEAkolik's tweet image. Andromeda #BOTNET (Downloader)
TEAkolik's tweet image. Andromeda #BOTNET (Downloader)
TEAkolik's tweet image. Andromeda #BOTNET (Downloader)

Found another interesting IP on #limenet http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080

raghav127001's tweet image. Found another interesting IP on #limenet

http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080
raghav127001's tweet image. Found another interesting IP on #limenet

http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080

Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops cyble.com/blog/lunobotne… #Linux #botnet

0xor0ne's tweet image. Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops

cyble.com/blog/lunobotne…

#Linux #botnet
0xor0ne's tweet image. Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops

cyble.com/blog/lunobotne…

#Linux #botnet

Ever heard of a #botnet? If not, it’s time to pay attention 👀 These massive networks of hacked devices are behind some of the biggest #cyberattacks ever! Let’s break down what botnets are, the most notorious botnets, the massive attacks they’ve executed, and how to keep your…

Resonancesec's tweet image. Ever heard of a #botnet? 
If not, it’s time to pay attention 👀

These massive networks of hacked devices are behind some of the biggest #cyberattacks ever!

Let’s break down what botnets are, the most notorious botnets, the massive attacks they’ve executed, and how to keep your…

#mirai #botnet 💣93.123.85.197💣 Back sharing mirai botnet files -arm5 -arm6 -arm -arm7 -mips -mpsl -ppc -sh4 -spc -x86 -x86_64 -m68k urlhaus.abuse.ch/host/93.123.85…

RacWatchin8872's tweet image. #mirai #botnet
💣93.123.85.197💣
Back sharing mirai botnet files
-arm5
-arm6
-arm
-arm7
-mips
-mpsl
-ppc
-sh4
-spc
-x86
-x86_64
-m68k
urlhaus.abuse.ch/host/93.123.85…

Loading...

Something went wrong.


Something went wrong.


United States Trends