#botnet résultats de recherche
Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops cyble.com/blog/lunobotne… #Linux #botnet


🚨#Opendir #botnet🚨 http://176.113.115.7/files/ ⚠️#Redline #Stealer ☣️C2C hosting with several pieces of malware per folder. 🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)



Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

🕷️ Underground Market Exposed: Clear Web Selling Cybercrime Tools A website openly offers #BOTNET, #Crypters, #Exploits, Keyloggers & #RAT tools 🚨 URL (DEFANGED): hxxps://www.darkexploits[.]is/product-category/rat/ #Cybercrime #Darkweb
![cyberfeeddigest's tweet image. 🕷️ Underground Market Exposed: Clear Web Selling Cybercrime Tools
A website openly offers #BOTNET, #Crypters, #Exploits, Keyloggers & #RAT tools 🚨
URL (DEFANGED): hxxps://www.darkexploits[.]is/product-category/rat/
#Cybercrime #Darkweb](https://pbs.twimg.com/media/Gy0U1ivXIAA6VjR.jpg)
New Botnet Emerges from the Shadows: NightshadeC2: esentire.com/blog/new-botne… #malware #botnet #infosec #informationsecurity #c2 #threathunting

🚨 Ermac Banking #Botnet v3.0 Leak 🚨 A site distributing #Hackingtools allegedly shared Ermac Banking Botnet V3.0 — an evolved #Android trojan derived from Cerberus & Hook. It targets 700+ banking, shopping & crypto apps worldwide. #Cybercrime #Malware

🚨 #Darkweb Leak — #VIPER Multi-OS #Botnet v1.0.1 allegedly shared A forum post claims a FUD, multi-OS (#Windows #macOS #Linux) botnet with exploit modules. Handle with extreme caution — for #MalwareAnalysts & defenders only. #CyberSecurity

🧪 'Poison Tools' Exposed – Clearweb Site Selling #RATs, #Stealers & More A clearweb site is openly offering #Botnet, #Ransomware, #Crypter, #Exploit kits, #SpammingTools & various versions of #CRAXRAT, #REDLINE. Site: hxxps://poisonsoftwares[.]com/ #CyberCrime #Malware…
![cyberfeeddigest's tweet image. 🧪 'Poison Tools' Exposed – Clearweb Site Selling #RATs, #Stealers & More
A clearweb site is openly offering #Botnet, #Ransomware, #Crypter, #Exploit kits, #SpammingTools & various versions of #CRAXRAT, #REDLINE.
Site: hxxps://poisonsoftwares[.]com/
#CyberCrime #Malware…](https://pbs.twimg.com/media/GxP0iJRXoAQz0rI.jpg)
Heu vist el robot Ona repartint 📦 paquets pel Born? ✅ Són proves del projecte #BotNet (@iri_robotics +@carnetbcn + VAIVE Logistics) que està testant l'ús de vehicles elèctrics autònoms en #superilles. Amb el suport de @barcelona_cat @FundlaCaixaCAT. ➡️ upc.edu/ca/sala-de-pre…
🛑 DarkExploits Marketplace — #BOTNET, #Crypters, #Exploits, #Keyloggers & #RAT for Sale 🛑 A clearweb site hxxps://www[.]darkexploits[.]is/ is openly selling malicious tools, making it a notable source for #Malware analysts. ⚠️ Handle with extreme caution — potential legal &…
![cyberfeeddigest's tweet image. 🛑 DarkExploits Marketplace — #BOTNET, #Crypters, #Exploits, #Keyloggers & #RAT for Sale 🛑
A clearweb site hxxps://www[.]darkexploits[.]is/ is openly selling malicious tools, making it a notable source for #Malware analysts.
⚠️ Handle with extreme caution — potential legal &…](https://pbs.twimg.com/media/GyNdd8XWUAE0XYb.jpg)
Apparently, this #Mirai threat actor was feeling creative when registering the #botnet C2 domain names! 🤦 Mirai sample: 👉 bazaar.abuse.ch/sample/2e82e8d… Botnet C2 domains: 📡 threatfox.abuse.ch/browse/malware…

🚫BadShare: Akamai's new "bad shares" technique can shut down malicious cryptomining botnets. Researchers dropped one operation's hashrate from millions to zero 💸 Read further: technadu.com/zero-hashrate-… #Akamai #Botnet #Cryptomining #Monero #SecurityResearch #Hashrate #BadShare

"Since October 8, 2025, GreyNoise has tracked a coordinated botnet operation involving over 100,000 unique IP addresses from more than 100 countries targeting Remote Desktop Protocol (RDP) services in the United States". #Cybersecurity #BotNet #RDP greynoise.io/blog/botnet-la…
Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

💥 RondoDox botnet is firing an 'exploit shotgun' at Microsoft Edge vulnerabilities. Is your endpoint security ready? #Botnet #EdgeSecurity ⤵️
Nuevo botnet peligroso, RondoDox, ataca a nivel mundial a una velocidad incontrolable. ¡Descubre los detalles! #ciberseguridad #botnet exe.io/xrxcd

🔹 بوت نت RondoDox يستخدم أسلوب “طلقات الاستغلال العشوائية” شبكة RondoDox Botnet تعتمد على استراتيجية هجومية جديدة تُعرف بـ “Exploit Shotgun” لاستهداف أكبر عدد من الأنظمة في وقت واحد. #RondoDox #Botnet #Malware #CyberThreat

#RondoDox #botnet #targets #56 #n-#day #flaws #in #worldwide #attacks bleepingcomputer.com/news/security/…
RondoDox insegna che la tecnologia è sia affascinante che inquietante, mentre OpenAI e Microsoft affrontano le loro sfide. #OpenAI #botnet daily.movingwords.it

#ThreatProtection Uptick of activity attributed to the #RondoDox #botnet, read more about Symantec's protection: broadcom.com/support/securi… #malware
Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

#RondoDox #botnet fires 'exploit shotgun' at nearly every router and internet-connected home device #Malware #CyberSecurity theregister.com/2025/10/09/ron… via @theregister
RondoDox: a nova botnet ‘shotgun’ que ataca 56 vulnerabilidades em routers e câmaras #botnet #cve #digital #exploit #firmware #hacking #internet #iot #malware #marcas #qnap #segurança #servidores #tplink #vulnerabilidade #vulnerabilidades #web tugatech.com.pt/t72718-rondodo…
RondoDox botnet targets 56 n-day flaws in worldwide attacks reconbee.com/rondodox-botne… #RondoDoxbotnet #botnet #cyberattacks #CybersecurityNews
BOTNET RONDODOX VISA FALHAS DE 56 DIAS EM ATAQUES MUNDIAIS samirnews.com/2025/10/botnet… #SamirNews #botnet #rondodox #visa #falhas #de #56 #dias #em #ataques #mundiais
🪲 Security RondoDox botnet targets 56 n-day flaws across 30+ device types, including Pwn2Own-disclosed bugs. #Botnet #Vulnerabilities #CyberSecurity #IoT

🚨 A new RondoDox botnet is actively exploiting 56 n-day flaws in over 30 device types globally, including Pwn2Own bugs! Stay informed. bleepingcomputer.com/news/security/… #RondoDox #Botnet #CyberSecurity #Vulnerability
Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted. C2: hxxp://80[.]251.153.96/ md5:…
![0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.
C2: hxxp://80[.]251.153.96/
md5:…](https://pbs.twimg.com/media/GVfy2eFW4AAO8tc.jpg)
![0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.
C2: hxxp://80[.]251.153.96/
md5:…](https://pbs.twimg.com/media/GVfy4_0XAAAqLZ7.png)
![0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.
C2: hxxp://80[.]251.153.96/
md5:…](https://pbs.twimg.com/media/GVfzC0WXAAA43ad.jpg)
![0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.
C2: hxxp://80[.]251.153.96/
md5:…](https://pbs.twimg.com/media/GVfzmySWcAA_j1_.jpg)
94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet IP resolves to cyberbotne.stresse[.]live Using @ValidinLLC to pivot on base domain, I came across another IP 94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser
![raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC to pivot on base domain, I came across another IP
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser](https://pbs.twimg.com/media/GTddfKVWYAAwdzj.png)
![raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC to pivot on base domain, I came across another IP
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser](https://pbs.twimg.com/media/GTddg47XMAEmGYv.jpg)
![raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC to pivot on base domain, I came across another IP
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser](https://pbs.twimg.com/media/GTdeCyuW4AAtiKl.jpg)
![raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC to pivot on base domain, I came across another IP
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser](https://pbs.twimg.com/media/GTdeDyjW4AAmLUF.jpg)

#botnet #iocs! 430 duplicates which means they have been online for a while. and 49 new malware urls! Malware urls/IOC's can be found here: pastebin.com/0QTEJvkX urlhaus.abuse.ch/browse/

Amazing to finally meet in person @0dayCTF at @defcon !!! #botnet #spyware #ransomware #stealer #adware #defcon #defcon32 #cyber #womanincyber #womanincybersecurity #hacker #cybercriminal #хакер #skynet #blackhat #blackhathacker #vxug

IM android botnet #botnet is active. its based in China hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a APK distribution address: hxxps://besa[.]top/test C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html icon_hash="-1153292831" urlscan:…
![0x6rss's tweet image. IM android botnet #botnet is active. its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831"
urlscan:…](https://pbs.twimg.com/media/GfeZHg9XUAAlCpI.jpg)
![0x6rss's tweet image. IM android botnet #botnet is active. its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831"
urlscan:…](https://pbs.twimg.com/media/GfeZJLOWcAA88IT.jpg)
![0x6rss's tweet image. IM android botnet #botnet is active. its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831"
urlscan:…](https://pbs.twimg.com/media/GfeZK64XYAAR8c6.jpg)
![0x6rss's tweet image. IM android botnet #botnet is active. its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831"
urlscan:…](https://pbs.twimg.com/media/Gfeg_3_W8AAzgcW.png)
⚠️New #Android Banking Botnet Affecting many countries.. C2: hxxp://16.163.253[.122:8020 @LukasStefanko @malwrhunterteam



🚨#Opendir #botnet🚨 http://176.113.115.7/files/ ⚠️#Redline #Stealer ☣️C2C hosting with several pieces of malware per folder. 🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)



Found another interesting IP on #limenet http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080
![raghav127001's tweet image. Found another interesting IP on #limenet
http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080](https://pbs.twimg.com/media/GTeCfaAWYAAR34V.jpg)
![raghav127001's tweet image. Found another interesting IP on #limenet
http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080](https://pbs.twimg.com/media/GTeC8kiW0AAyFY5.jpg)
Luno: Linux botnet combining modular DDoS, stealthy crypto-mining, binary replacement & watchdog loops cyble.com/blog/lunobotne… #Linux #botnet


Ever heard of a #botnet? If not, it’s time to pay attention 👀 These massive networks of hacked devices are behind some of the biggest #cyberattacks ever! Let’s break down what botnets are, the most notorious botnets, the massive attacks they’ve executed, and how to keep your…

Good morning, @defcon and @vxunderground #botnet #spyware #ransomware #stealer #adware #defcon #defcon32 #cyber #womanincyber #womanincybersecurity #hacker #cybercriminal #хакер #skynet #blackhat #blackhathacker #vxug


#mirai #botnet 💣93.123.85.197💣 Back sharing mirai botnet files -arm5 -arm6 -arm -arm7 -mips -mpsl -ppc -sh4 -spc -x86 -x86_64 -m68k urlhaus.abuse.ch/host/93.123.85…

Something went wrong.
Something went wrong.
United States Trends
- 1. Good Sunday 46.5K posts
- 2. Discussing Web3 N/A
- 3. #sundayvibes 4,116 posts
- 4. Auburn 47.2K posts
- 5. Wordle 1,576 X N/A
- 6. MACROHARD 8,202 posts
- 7. Gilligan's Island 5,224 posts
- 8. #SEVENTEEN_NEW_IN_TACOMA 39.4K posts
- 9. #MakeOffer 20.6K posts
- 10. QUICK TRADE 2,178 posts
- 11. Kirby 24.8K posts
- 12. #SVT_TOUR_NEW_ 31.4K posts
- 13. FDV 5min 2,207 posts
- 14. Utah 25.4K posts
- 15. #SVT_WORLDTOUR 28.7K posts
- 16. Market Cap Surges N/A
- 17. Dissidia 7,317 posts
- 18. Whale - Buy 1,825 posts
- 19. Boots 51.3K posts
- 20. Arizona 41K posts