#botnet search results

BitSight exposes RondoDox, a relentless IoT botnet using a "shotgun approach" with 174 exploits to hijack residential devices for massive DoS attacks. #RondoDox #Botnet #IoTSecurity #BitSight #CyberSecurity #ThreatIntel #InfoSec #DoS #Malware #TechNews securityonline.info/shotgun-approa…

the_yellow_fall's tweet image. BitSight exposes RondoDox, a relentless IoT botnet using a "shotgun approach" with 174 exploits to hijack residential devices for massive DoS attacks.

#RondoDox #Botnet #IoTSecurity #BitSight #CyberSecurity #ThreatIntel #InfoSec #DoS #Malware #TechNews
securityonline.info/shotgun-approa…

What distinguishes #Botnet "Drifter" is how it hides. Its C2 domains are named after IP camera brands (, ), chosen to blend with the traffic of devices that share a VLAN with the Android TV boxes it infects. github.com/deepfield/publ…

blackorbird's tweet image. What distinguishes #Botnet "Drifter" is how it hides. 
Its C2 domains are named after IP camera brands (, ), chosen to blend with the traffic of devices that share a VLAN with the Android TV boxes it infects. 
github.com/deepfield/publ…

New SSHStalker botnet uses vintage IRC tactics & automated SSH brute-forcing to compromise Linux servers. Flare research reveals a "zombie army" in the making. #SSHStalker #LinuxSecurity #Botnet #CyberSecurity #InfoSec #IRC #CloudSecurity securityonline.info/back-to-the-fu…


Simple FREE Firefox VPN Are free VPNs safe in 2026? Discover why Mozilla's new built-in Firefox VPN might save you from malicious apps and botnets. Protect your web traffic now! #firefox #vpn #botnet


Bitsight unmasks the Phorpiex "Twizt" variant: a self-healing P2P botnet with RSA-encrypted payloads and LFI scanners. See how this 2011 threat stays relevant. #Phorpiex #Botnet #CyberSecurity #InfoSec #MalwareAnalysis #P2P #ThreatIntel #Twizt securityonline.info/phorpiex-botne…

the_yellow_fall's tweet image. Bitsight unmasks the Phorpiex "Twizt" variant: a self-healing P2P botnet with RSA-encrypted payloads and LFI scanners. See how this 2011 threat stays relevant.

#Phorpiex #Botnet #CyberSecurity #InfoSec #MalwareAnalysis #P2P #ThreatIntel #Twizt
securityonline.info/phorpiex-botne…

Lumen disrupted the Aisuru and Kimwolf botnets by cutting off 550 command-and-control servers. #botnet #cybersecurity cnews.link/lumen-strikes-…


#botnet The KimWolf botnet (also known as "niggabox") is a large-scale Android malware targeting TV boxes, set-top boxes, and tablets, infecting over 1.8 million devices across 222 countries. It evolved from the Aisuru botnet and focuses on proxy services and DDoS attacks.

blackorbird's tweet image. #botnet
The KimWolf botnet (also known as "niggabox") is a large-scale Android malware targeting TV boxes, set-top boxes, and tablets, infecting over 1.8 million devices across 222 countries. It evolved from the Aisuru botnet and focuses on proxy services and DDoS attacks.

Researchers report that the Kimwolf botnet has infected over 2 million Android devices through residential proxies, executing massive DDoS attacks and highlighting the risks posed by unsecured proxy networks. #cybersecurity #botnet securityaffairs.com/186559/malware…


Panne mondiale 🌎 d’Amazon : un #botnet a profité du chaos pour lancer des #cyberattaques, et infecter en douce des objets connectés Le botnet exploite au moins 8 failles identifiées dans les IoTs buff.ly/ywezagL

fadouce's tweet image. Panne mondiale 🌎 d’Amazon : un #botnet a profité du chaos pour lancer des #cyberattaques, et infecter en douce des objets connectés 
Le botnet exploite au moins 8 failles identifiées dans les IoTs 
buff.ly/ywezagL

#V3G4 #Botnet Evolves: From DDoS to Covert Cryptomining securitytc.com/TPc6JQ

evanderburg's tweet image. #V3G4 #Botnet Evolves: From DDoS to Covert Cryptomining securitytc.com/TPc6JQ

MystRodX: The Covert Dual-Mode Backdoor Threat #botnet blog.xlab.qianxin.com/mystrodx_cover…

blackorbird's tweet image. MystRodX: The Covert Dual-Mode Backdoor Threat #botnet
blog.xlab.qianxin.com/mystrodx_cover…

Analyze DSLRoot Proxy Network & IP Addresses #Malware #BotNet infrawatch.app/blog/dslroot-u…

blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…
blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…
blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…

An unusually large, moments ago #botnet scan all from source port 19000 (not the "usual" Amazon sourced scans that I see every morning like clockwork at 06:45). Raw logs and source IP's: gist.github.com/silence-is-bes…

James_inthe_box's tweet image. An unusually large, moments ago #botnet scan all from source port 19000 (not the "usual" Amazon sourced scans that I see every morning like clockwork at 06:45).  Raw logs and source IP's:

gist.github.com/silence-is-bes…

#Kimwolf v7: The updated #IoT #botnet behind record #DDoS attacks adds HTTP/2 floods with Chrome fingerprint spoofing, #Tor backup C2, and five Ethereum RPC endpoints for resilient blockchain-based infrastructure. Details at bit.ly/4s2U894

Unit42_Intel's tweet image. #Kimwolf v7: The updated #IoT #botnet behind record #DDoS attacks adds HTTP/2 floods with Chrome fingerprint spoofing, #Tor backup C2, and five Ethereum RPC endpoints for resilient blockchain-based infrastructure. Details at bit.ly/4s2U894
Unit42_Intel's tweet image. #Kimwolf v7: The updated #IoT #botnet behind record #DDoS attacks adds HTTP/2 floods with Chrome fingerprint spoofing, #Tor backup C2, and five Ethereum RPC endpoints for resilient blockchain-based infrastructure. Details at bit.ly/4s2U894
Unit42_Intel's tweet image. #Kimwolf v7: The updated #IoT #botnet behind record #DDoS attacks adds HTTP/2 floods with Chrome fingerprint spoofing, #Tor backup C2, and five Ethereum RPC endpoints for resilient blockchain-based infrastructure. Details at bit.ly/4s2U894
Unit42_Intel's tweet image. #Kimwolf v7: The updated #IoT #botnet behind record #DDoS attacks adds HTTP/2 floods with Chrome fingerprint spoofing, #Tor backup C2, and five Ethereum RPC endpoints for resilient blockchain-based infrastructure. Details at bit.ly/4s2U894

Security experts have exposed Kimwolf, a massive Android botnet infecting over 1.8 million devices, utilizing advanced techniques like DNS over TLS and EtherHiding to evade detection and launch large-scale DDoS attacks. #CyberSecurity #Botnet blog.xlab.qianxin.com/kimwolf-botnet…


Cydome warns that the Mirai-based Broadside botnet is exploiting a vulnerability in TBK DVRs, posing serious threats to maritime logistics by enabling DDoS attacks and compromising critical systems on vessels. #CyberSecurity #Botnet securityaffairs.com/185491/malware…


A new botnet called "Broadside" is threatening shipping companies by stealing credentials from infected TBK DVR devices and launching DDoS attacks, according to SecurityWeek. #CyberSecurity #Botnet securityweek.com/new-broadside-…


🚨 Active exploitation alert: New Mirai botnet campaign exploiting CVE-2025-29635 (RCE) on End-of-Life D-Link routers. If your network still runs EoL devices, you're volunteering compute power to threat actors. Replace or isolate NOW. #IoTSecurity #Mirai #Botnet #CVE


📡🦠 mirai campaign exploits d-link routers for botnet growth Attackers target vulnerable routers to expand botnets using a known RCE flaw. learn more bleepingcomputer.com #mirai #iot #botnet #cybersecurity #infosec

Strivehawk's tweet image. 📡🦠 mirai campaign exploits d-link routers for botnet growth
Attackers target vulnerable routers to expand botnets using a known RCE flaw. learn more bleepingcomputer.com
#mirai #iot #botnet #cybersecurity #infosec

Demon botnet — new multi-arch samples (2026-04-22) SH4, MIPS-LE, MIPS variants | 43-45 VT detections ns3.jpg: ELF disguised as JPEG (44 VT) — evades file-type filters bins.sh: multi-arch Mirai downloader (36 VT) TLP:WHITE #ThreatIntel #BotNet #MalwareAnalysis


The Gentlemen ransomware-as-a-service has expanded rapidly, infecting 1,570+ corporate networks via SystemBC proxy using tactics like GPO abuse and Defender disabling across Windows, Linux, NAS, and ESXi. #Ransomware #Botnet #Israel ift.tt/gYqfOtT


🤖🦠 gentlemen ransomware uses botnet for attacks A large botnet is powering ransomware operations, increasing scale and impact of attacks. #ransomware #botnet #malware #cybersecurity #infosec

Strivehawk's tweet image. 🤖🦠 gentlemen ransomware uses botnet for attacks
A large botnet is powering ransomware operations, increasing scale and impact of attacks.
#ransomware #botnet #malware #cybersecurity #infosec

New honeypot signals — Apr 14-21 SIP port 5060 scanning: 220 events (first observed) Mirai creds dominating SSH: 345gs5662d34:345gs5662d34 (691 attempts) IoT botnet still spreading via Mirai credential cycling. #ThreatIntel #Honeypot #BotNet #SSH


🔴 BOTNET ALERT: Nexcorium (Mirai variant) exploits CVE-2024-3721 to hijack TBK DVRs for DDoS attacks. Millions of IoT devices still unpatched & vulnerable. Update your firmware NOW. #IoTSecurity #DDoS #Botnet


BitSight unmasks RondoDox: a modular botnet using "nanomites" to dodge debuggers while hijacking 18 architectures for Monero mining and gaming DoS attacks. #RondoDox #Botnet #CyberSecurity #InfoSec #Malware #GamingSecurity #IoT #Nanomites securityonline.info/rondodox-botne…

the_yellow_fall's tweet image. BitSight unmasks RondoDox: a modular botnet using "nanomites" to dodge debuggers while hijacking 18 architectures for Monero mining and gaming DoS attacks.

#RondoDox #Botnet #CyberSecurity #InfoSec #Malware #GamingSecurity #IoT #Nanomites
securityonline.info/rondodox-botne…

2/2 ↳ Persists via crontab + systemd ↳ Launches DDoS over UDP, TCP & SMTP ↳ EoL TP-Link routers also in the crosshairs 🎯 IoT devices = sitting ducks. Patch. Isolate. Replace. #Botnet #InfoSec #BotnetAlert


Cisco Talos uncovers PowMix, a stealthy botnet targeting Czech HR via AMSI bypass and Heroku-hosted C2. Learn how this malware evades modern EDR systems. #PowMix #Botnet #CyberSecurity #InfoSec #CzechRepublic #Malware #CiscoTalos #AMSIBypass securityonline.info/powmix-botnet-…

the_yellow_fall's tweet image. Cisco Talos uncovers PowMix, a stealthy botnet targeting Czech HR via AMSI bypass and Heroku-hosted C2. Learn how this malware evades modern EDR systems.

#PowMix #Botnet #CyberSecurity #InfoSec #CzechRepublic #Malware #CiscoTalos #AMSIBypass
securityonline.info/powmix-botnet-…

Mirai Malware Spreads Through Vulnerable TBK DVR Devices cysecurity.news/2026/04/mirai-… #Botnet #CVEvulnerability #DVR

EHackerNews's tweet image. Mirai Malware Spreads Through Vulnerable TBK DVR Devices cysecurity.news/2026/04/mirai-… #Botnet #CVEvulnerability #DVR

A recent campaign exploiting CVE-2024-3721 in TBK DVR devices to deliver a multi-architecture Mirai variant called Nexcorium #botnet fortinet.com/blog/threat-re…

blackorbird's tweet image. A recent campaign exploiting CVE-2024-3721 in TBK DVR devices to deliver a multi-architecture Mirai variant called Nexcorium #botnet
fortinet.com/blog/threat-re…

Mirai Malware Evolves into Hundreds of Variants Driving Botnet Growth buff.ly/3BKMg7j #infosec #cybersecurity #botnet #malware

johnmcclure00's tweet image. Mirai Malware Evolves into Hundreds of Variants Driving Botnet Growth buff.ly/3BKMg7j #infosec #cybersecurity  #botnet #malware

Cisco Talos uncovers 'PowMix,' a new botnet targeting the Czech Republic. Uses randomized C2 beaconing and embeds data in URL paths to evade detection. 🇨🇿 #Botnet #PowMix #Malware #ThreatIntel #CiscoTalos 🔗 cyber.netsecops.io/articles/steal…


Newly Discovered #PowMix #Botnet Hits #Czech Workers Using Randomized #C2 Traffic buff.ly/FA37bCb

omvapt's tweet image. Newly Discovered #PowMix #Botnet Hits #Czech Workers Using Randomized #C2 Traffic 
buff.ly/FA37bCb

What distinguishes #Botnet "Drifter" is how it hides. Its C2 domains are named after IP camera brands (, ), chosen to blend with the traffic of devices that share a VLAN with the Android TV boxes it infects. github.com/deepfield/publ…

blackorbird's tweet image. What distinguishes #Botnet "Drifter" is how it hides. 
Its C2 domains are named after IP camera brands (, ), chosen to blend with the traffic of devices that share a VLAN with the Android TV boxes it infects. 
github.com/deepfield/publ…

BitSight unmasks RondoDox: a modular botnet using "nanomites" to dodge debuggers while hijacking 18 architectures for Monero mining and gaming DoS attacks. #RondoDox #Botnet #CyberSecurity #InfoSec #Malware #GamingSecurity #IoT #Nanomites securityonline.info/rondodox-botne…

the_yellow_fall's tweet image. BitSight unmasks RondoDox: a modular botnet using "nanomites" to dodge debuggers while hijacking 18 architectures for Monero mining and gaming DoS attacks.

#RondoDox #Botnet #CyberSecurity #InfoSec #Malware #GamingSecurity #IoT #Nanomites
securityonline.info/rondodox-botne…

A recent campaign exploiting CVE-2024-3721 in TBK DVR devices to deliver a multi-architecture Mirai variant called Nexcorium #botnet fortinet.com/blog/threat-re…

blackorbird's tweet image. A recent campaign exploiting CVE-2024-3721 in TBK DVR devices to deliver a multi-architecture Mirai variant called Nexcorium #botnet
fortinet.com/blog/threat-re…

BitSight exposes RondoDox, a relentless IoT botnet using a "shotgun approach" with 174 exploits to hijack residential devices for massive DoS attacks. #RondoDox #Botnet #IoTSecurity #BitSight #CyberSecurity #ThreatIntel #InfoSec #DoS #Malware #TechNews securityonline.info/shotgun-approa…

the_yellow_fall's tweet image. BitSight exposes RondoDox, a relentless IoT botnet using a "shotgun approach" with 174 exploits to hijack residential devices for massive DoS attacks.

#RondoDox #Botnet #IoTSecurity #BitSight #CyberSecurity #ThreatIntel #InfoSec #DoS #Malware #TechNews
securityonline.info/shotgun-approa…

MystRodX: The Covert Dual-Mode Backdoor Threat #botnet blog.xlab.qianxin.com/mystrodx_cover…

blackorbird's tweet image. MystRodX: The Covert Dual-Mode Backdoor Threat #botnet
blog.xlab.qianxin.com/mystrodx_cover…

#tracking #moobot #botnet with @silentpush @silentpush_labs html_body_ssdeep #moobot typically has a redirect count down 3,2,1, towards fbi[.]gov we are leveraging this unique identicator to track moobot. Lets investigate the first ip: 161.97.175.164

banthisguy9349's tweet image. #tracking #moobot #botnet with @silentpush @silentpush_labs  html_body_ssdeep

#moobot typically has a redirect count down 3,2,1, towards fbi[.]gov we are leveraging this unique identicator to track moobot.

Lets investigate the first ip: 161.97.175.164
banthisguy9349's tweet image. #tracking #moobot #botnet with @silentpush @silentpush_labs  html_body_ssdeep

#moobot typically has a redirect count down 3,2,1, towards fbi[.]gov we are leveraging this unique identicator to track moobot.

Lets investigate the first ip: 161.97.175.164

For those tracking #botnet activity, a rather impressive scan (moments ago) sourced from port 19000; raw logs and source IP's here: gist.github.com/silence-is-bes…

James_inthe_box's tweet image. For those tracking #botnet activity, a rather impressive scan (moments ago) sourced from port 19000; raw logs and source IP's here:

gist.github.com/silence-is-bes…

#botnet The KimWolf botnet (also known as "niggabox") is a large-scale Android malware targeting TV boxes, set-top boxes, and tablets, infecting over 1.8 million devices across 222 countries. It evolved from the Aisuru botnet and focuses on proxy services and DDoS attacks.

blackorbird's tweet image. #botnet
The KimWolf botnet (also known as "niggabox") is a large-scale Android malware targeting TV boxes, set-top boxes, and tablets, infecting over 1.8 million devices across 222 countries. It evolved from the Aisuru botnet and focuses on proxy services and DDoS attacks.

Cisco Talos uncovers PowMix, a stealthy botnet targeting Czech HR via AMSI bypass and Heroku-hosted C2. Learn how this malware evades modern EDR systems. #PowMix #Botnet #CyberSecurity #InfoSec #CzechRepublic #Malware #CiscoTalos #AMSIBypass securityonline.info/powmix-botnet-…

the_yellow_fall's tweet image. Cisco Talos uncovers PowMix, a stealthy botnet targeting Czech HR via AMSI bypass and Heroku-hosted C2. Learn how this malware evades modern EDR systems.

#PowMix #Botnet #CyberSecurity #InfoSec #CzechRepublic #Malware #CiscoTalos #AMSIBypass
securityonline.info/powmix-botnet-…

Bitsight unmasks the Phorpiex "Twizt" variant: a self-healing P2P botnet with RSA-encrypted payloads and LFI scanners. See how this 2011 threat stays relevant. #Phorpiex #Botnet #CyberSecurity #InfoSec #MalwareAnalysis #P2P #ThreatIntel #Twizt securityonline.info/phorpiex-botne…

the_yellow_fall's tweet image. Bitsight unmasks the Phorpiex "Twizt" variant: a self-healing P2P botnet with RSA-encrypted payloads and LFI scanners. See how this 2011 threat stays relevant.

#Phorpiex #Botnet #CyberSecurity #InfoSec #MalwareAnalysis #P2P #ThreatIntel #Twizt
securityonline.info/phorpiex-botne…

An unusually large, moments ago #botnet scan all from source port 19000 (not the "usual" Amazon sourced scans that I see every morning like clockwork at 06:45). Raw logs and source IP's: gist.github.com/silence-is-bes…

James_inthe_box's tweet image. An unusually large, moments ago #botnet scan all from source port 19000 (not the "usual" Amazon sourced scans that I see every morning like clockwork at 06:45).  Raw logs and source IP's:

gist.github.com/silence-is-bes…

Panne mondiale 🌎 d’Amazon : un #botnet a profité du chaos pour lancer des #cyberattaques, et infecter en douce des objets connectés Le botnet exploite au moins 8 failles identifiées dans les IoTs buff.ly/ywezagL

fadouce's tweet image. Panne mondiale 🌎 d’Amazon : un #botnet a profité du chaos pour lancer des #cyberattaques, et infecter en douce des objets connectés 
Le botnet exploite au moins 8 failles identifiées dans les IoTs 
buff.ly/ywezagL

Botnet was used to launch ransomware attacks against dozens of US businesses. More: cnews.link/russian-cyberc… #botnet #US #crime #ransomware

Cybernews's tweet image. Botnet was used to launch ransomware attacks against dozens of US businesses. More: cnews.link/russian-cyberc…

#botnet #US #crime #ransomware

bobbot[.]xcvx[.]online xcvx[.]online 3 malware samples communicating to @Namecheap registered domain virustotal.com/gui/domain/bob… #hailbot #botnet cc: @abuse_ch

banthisguy9349's tweet image. bobbot[.]xcvx[.]online
xcvx[.]online

3 malware samples communicating to @Namecheap registered domain virustotal.com/gui/domain/bob…

#hailbot #botnet 

cc: @abuse_ch

Analyze DSLRoot Proxy Network & IP Addresses #Malware #BotNet infrawatch.app/blog/dslroot-u…

blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…
blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…
blackorbird's tweet image. Analyze DSLRoot Proxy Network & IP Addresses
#Malware #BotNet

infrawatch.app/blog/dslroot-u…

PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign dlvr.it/TPMQ3F #Cybersecurity #Botnet #Malware #PolarEdge #Cisco

blueteamsec1's tweet image. PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign dlvr.it/TPMQ3F #Cybersecurity #Botnet #Malware #PolarEdge #Cisco

#V3G4 #Botnet Evolves: From DDoS to Covert Cryptomining securitytc.com/TPc6JQ

evanderburg's tweet image. #V3G4 #Botnet Evolves: From DDoS to Covert Cryptomining securitytc.com/TPc6JQ

Loading...

Something went wrong.


Something went wrong.