botnet

Hide and Seek (HNS) IoT Botnet targets Android devices with ADB option enabled

The latest samples of the HNS bot were designed to target Android devices having the wireless debugging feature ADB enabled.…

7 years ago

New Virobot malware combines ransomware and botnet capabilities

Security experts from Trend Micro discovered a new malware tracked as Virobot that combines ransomware and botnet capabilities. Virobot encrypts…

7 years ago

Kelihos botmaster pleads guilty in U.S. District Court in Connecticut

The creator of the infamous Kelihos Botnet, Peter Yuryevich Levashov (38) pleaded guilty this week to computer crime, fraud, conspiracy and identity…

7 years ago

Mirai and Gafgyt target Apache Struts and SonicWall to hit enterprises

Security experts with Unit 42 at Palo Alto Networks have discovered new variants of the Mirai and Gafgyt IoT malware…

7 years ago

Hacking The Hacker. Stopping a big botnet targeting USA, Canada and Italy

Today I'd like to share a full path analysis including a KickBack attack which took me to gain full access…

7 years ago

Federal prosecutors indicted a 20-year-old man who built the Satori botnet

A youngster (20) from Washington was indicted last week on federal computer hacking charges after rival hackers fingered him as…

7 years ago

A new Cross-Platform Mirai Variant appeared in the wild

A new cross-platform Mirai variant appeared in the threat landscape, this one has been created using an open-source project. Security…

7 years ago

Piping botnet: Researchers warns of possible cyberattacks against urban water services

Piping botnet - Israeli researchers warn of a potential distributed attack against urban water services that uses a botnet of…

8 years ago

Duo Security created open tools and techniques to identify large Twitter botnet

Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be…

8 years ago

Group-IB experts record a massive surge of user data leaks form cryptocurrency exchanges

Group-IB researchers have investigated user data leaks from cryptocurrency exchanges and has analyzed the nature of these incidents. Security experts…

8 years ago

This website uses cookies.