EHA
Bondnet Using High-Performance Bots For C2 Server

Bondnet Using High-Performance Bots For C2 Server

Threat actors abuse high-performance bots to carry out large-scale automated attacks efficiently. These bots can work quickly, flood systems, steal information, and conduct and orchestrate sophisticated cyber operations largely autonomously. Cybersecurity researchers at ASEC recently discovered...
Europol Starts Hunting For Emotet Malware Developer And Mastermind

Europol Starts Hunting For Emotet Malware Developer And Mastermind

The Europol-led Operation Endgame focuses on the individual threat actors operating behind the botnets. Cyberlaw enforcement is very dedicated to locating who created the once-powerful Emotet malware as a service; this creator is known only...
Hackers Weaponize Authentication Tools To Deliver NiceRAT Malware via Botnet

Hackers Weaponize Authentication Tools To Deliver NiceRAT Malware via Botnet

Botnets, traditionally used for DDoS attacks with malware like Nitol, are now being built with malware capable of data exfiltration and installing additional malware, confirmed by the discovery of NiceRAT malware being installed through...
Hackers Compromised 600,000 SOHO Routers Within 72 Hours For Botnet

Hackers Compromised 600,000 SOHO Routers Within 72 Hours For Botnet

Hackers often target the routers to take charge of network traffic, get hold of sensitive data, and attack attached devices. When a router is hacked, it can create a botnet for major cyber-attacks or send...
911 S5 Botnet Dismantled

911 S5 Botnet with 19 Million IP Addresses Dismantled & Admin Arrested

The U.S. Department of Justice (DOJ) announced the dismantling of the 911 S5 botnet, a massive network of compromised computers used for various illegal activities. The operation carried out in cooperation with international law enforcement...
New Sysrv Botnet Variant Makes Use Of Google Subdomain To Spread XMRig Miner

New Sysrv Botnet Abuses Google Subdomain To Spread XMRig Miner

First identified in 2020, Sysrv is a botnet that uses a Golang worm to infect devices and deploy cryptominers, propagates by exploiting network vulnerabilities, and has been continuously updated with new techniques by its...
Hackers Advertising COVID Botnet Can bypass anti-DDoS systems

Hackers Advertising COVID Botnet Can bypass Anti-DDoS Systems

A new botnet named "COVID BOTNET" is being advertised on the dark web, claiming to target NATO servers and the broader Western digital infrastructure. The creators of this botnet are boasting about its ability...
U.s Disrupts Chinese Botnet that Hijacks SOHO Routers

US Disrupts Chinese Botnet that Hijacks SOHO Routers

In a decisive action, the U.S. The Department of Justice (DOJ) has disrupted a cyber operation by Chinese state-sponsored hackers.  This operation, codenamed Volt Typhoon, targeted American critical infrastructure using a vast network of compromised...
PikaBot Attacking Windows machine via malicious search ads

PikaBot Attacking Windows Machine via Malicious Search Ads

In the labyrinth of cyber threats that define the digital landscape, 2023 has witnessed the resurgence of a particularly pernicious foe — malicious advertisements, colloquially known as "malvertising."  This nefarious stratagem has set its sights...
GoTitan Botnet Apache ActiveMQ

GoTitan Botnet Actively Exploiting Apache ActiveMQ Vulnerability

Attackers are exploiting the recently discovered critical security vulnerability tracked as (CVE-2023-46604) affecting Apache ActiveMQ to disseminate the Golang-based botnet GoTitan and the.NET application "PrCtrl Rat," which has the ability to be remotely controlled. Any...

Managed WAF

Website

Latest News