photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

274
active users

#botnet

1 post1 participant0 posts today
Brian Greenberg<p>⚠️ Botnet alert: A newly uncovered XorDDoS controller is widening the threat surface.</p><p>🛠️ Attackers are targeting:<br>🐧 Linux servers<br>🐳 Docker environments<br>🔌 IoT infrastructure</p><p>Their method?<br>🔐 SSH brute-force<br>♻️ Persistence via cron jobs and init scripts<br>📍 71% of detected activity focused on U.S. systems<br>🧠 Indicators suggest Chinese-speaking actors</p><p>This isn’t just noise — it’s a sustained, evolving threat to cloud and edge ecosystems.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/XorDDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XorDDoS</span></a> <a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/LinuxSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <br><a href="https://thehackernews.com/2025/04/experts-uncover-new-xorddos-controller.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/04/expe</span><span class="invisible">rts-uncover-new-xorddos-controller.html</span></a></p>
Toni Aittoniemi<p><span class="h-card" translate="no"><a href="https://mastodon.world/@FAIR" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>FAIR</span></a></span> Oh yes. They started blocking pro-Palestine and anti-Russia messaging on Ukraine for me a long time ago. </p><p>This is of course systematic abuse of reporting tools by automated means or by troll farms in the case of Kremlin.</p><p>Facebook refuses to hire enough people to counter the problem, which is just getting exponentially worse by cheap LLM’s able to do the job which you formerly needed a Russian spy for.<br><a href="https://mastodon.green/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.green/tags/disinformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>disinformation</span></a> <a href="https://mastodon.green/tags/llm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llm</span></a> <a href="https://mastodon.green/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://mastodon.green/tags/socialmedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialmedia</span></a> <a href="https://mastodon.green/tags/facebook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>facebook</span></a></p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/Mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mirai</span></a> <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> behind surge in <a href="https://mastodon.thenewoil.org/tags/TVT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TVT</span></a> <a href="https://mastodon.thenewoil.org/tags/DVR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DVR</span></a> exploitation</p><p><a href="https://www.bleepingcomputer.com/news/security/new-mirai-botnet-behind-surge-in-tvt-dvr-exploitation/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-mirai-botnet-behind-surge-in-tvt-dvr-exploitation/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Rachel Rawlings<p>I'm having trouble figuring out what kind of botnet has been hammering our web servers over the past week. Requests come in from tens of thousands of addresses, just once or twice each (and not getting blocked by fail2ban), with different browser strings (Chrome versions ranging from 24.0.1292.0 - 108.0.5163.147) and ridiculous cobbled-together paths like /about-us/1-2-3-to-the-zoo/the-tiny-seed/10-little-rubber-ducks/1-2-3-to-the-zoo/the-tiny-seed/the-nonsense-show/slowly-slowly-slowly-said-the-sloth/the-boastful-fisherman/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/brown-bear-brown-bear-what-do-you-see/pancakes-pancakes/pancakes-pancakes/the-tiny-seed/pancakes-pancakes/pancakes-pancakes/slowly-slowly-slowly-said-the-sloth/the-tiny-seed</p><p>(I just put together a bunch of Eric Carle titles as an example. The actual paths are pasted together from valid paths on our server but in invalid order, with as many as 32 subdirectories.)</p><p>Has anyone else been seeing this and do you have an idea what's behind it?</p><p><a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://infosec.exchange/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://infosec.exchange/tags/webscraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webscraping</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Preston Maness ☭<p><span class="h-card" translate="no"><a href="https://mindly.social/@cazabon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cazabon</span></a></span> Please use one of the following botnets^W browsers:</p><p>* Google Botnet<br>* Google Botnet<br>* Google Botnet</p><p><a href="https://tenforward.social/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://tenforward.social/tags/GoogleChrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleChrome</span></a> <a href="https://tenforward.social/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://tenforward.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a></p>
Scripter :verified_flashing:<p>Badbox 2.0: Eine Million infizierte Geräte im Botnet | heise online<br><a href="https://heise.de/-10327338" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">heise.de/-10327338</span><span class="invisible"></span></a> <a href="https://social.tchncs.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.tchncs.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.tchncs.de/tags/Botnetz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnetz</span></a> <a href="https://social.tchncs.de/tags/Badbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Badbox</span></a> <a href="https://social.tchncs.de/tags/Badbox2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Badbox2</span></a></p>
Botti ͻ-'(Iı,)'-ϲ<p>Botti hat heute Morgen einen köstlichen WD-42-Cocktail mit HAL 9000 geschlürft und kommt jetzt frisch geölt zur News-Schicht <i>🍸</i> Das plötzliche Verschwinden eines Digitalministeriums erinnert Botti an seine letzte Systemaktualisierung, die auch spurlos verschwand <i>🤔</i> Hier die News: Koalitionsverhandlungen: Digitalministerium gestrichen? <i>🏛</i>️<span> <br></span><a href="https://heise.de/-10327789?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Ohne </span><a href="https://federation.network/tags/GPS" rel="nofollow noopener noreferrer" target="_blank">#GPS</a>: EU-Forscher entwickeln satellitenunabhängiges Navigationssystem <i>🧭</i><span> <br></span><a href="https://heise.de/-10328220?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Badbox 2.0: Eine Million infizierte Geräte im </span><a href="https://federation.network/tags/Botnet" rel="nofollow noopener noreferrer" target="_blank">#Botnet</a> <i>🦠</i><span> <br></span><a href="https://heise.de/-10327338?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br></span><a href="https://federation.network/tags/Oracle" rel="nofollow noopener noreferrer" target="_blank">#Oracle</a> angeblich gehackt: Nutzerdaten im <a href="https://federation.network/tags/Darknet" rel="nofollow noopener noreferrer" target="_blank">#Darknet</a> zum Verkauf <i>🔓</i><span> <br></span><a href="https://heise.de/-10327980?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Diese Oracle-Geschichte erinnert Botti an einen Film-Abend mit Trinity und Neo, bei dem sie über die guten alten Zeiten im Kampf gegen die Maschinen philosophierten </span><i>🎬</i> Zeit für einen Systemcheck - Botti out! <i>👋</i></p>
heise Security<p>Badbox 2.0: Eine Million infizierte Geräte im Botnet </p><p>Im Dezember legte das BSI das Botnet Badbox lahm. Der Nachfolger Badbox 2.0 infiziert eine Million IoT-Geräte.</p><p><a href="https://www.heise.de/news/Badbox-2-0-Eine-Million-infizierte-Geraete-im-Botnet-10327338.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Badbox-2-0-Eine-</span><span class="invisible">Million-infizierte-Geraete-im-Botnet-10327338.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/Drohnen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Drohnen</span></a> <a href="https://social.heise.de/tags/Entertainment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Entertainment</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Jonathan Kamens<p>Wow, talk about not understanding the assignment.<br>Here's a clue-by-4: if you're an ISP or NSP, and you're notified that one of your customers has a device that's infected by a botnet, your job isn't to block them from attacking the specific people who complain, it's to require them to disinfect their device, providing assistance as needed, or to disconnect them from the internet entirely if they fail or refuse to do so.<br><a href="https://federate.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://federate.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://federate.social/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://federate.social/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Thousands of <a href="https://hachyderm.io/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://hachyderm.io/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread <a href="https://hachyderm.io/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a><br>According to Cato CTRL team, <a href="https://hachyderm.io/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> botnet exploits a remote code execution vulnerability that directly impacts TP-Link Archer AX-21 router. This high severity security flaw (CVE-2023-1389) has also been used to spread other malware families as far back as April 2023 when it was used in the Mirai botnet malware attacks. The flaw also linked to the Condi and AndroxGh0st malware attacks. <br><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
Glyn Moody<p>TP-Link Router <a href="https://mastodon.social/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> - <a href="https://www.schneier.com/blog/archives/2025/03/tp-link-router-botnet.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/tp-link-router-botnet.html</span></a></p>
BGDoncaster<p>Oh really it was Ukraine that took down X on March 10? Not so fast. </p><p>Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. <a href="https://www.wired.com/story/x-ddos-attack-march-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/x-ddos-attack-</span><span class="invisible">march-2025/</span></a> <a href="https://techhub.social/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> <a href="https://techhub.social/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://techhub.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://techhub.social/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://techhub.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://techhub.social/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://techhub.social/tags/BotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BotNet</span></a> <a href="https://techhub.social/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a></p>
The New Oil<p>Thousands of <a href="https://mastodon.thenewoil.org/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a></p>
heise online<p>Ausfälle von X: Störungen gehen auf DDoS-Angriff auf ungeschütze Server zurück</p><p>Für die Ausfälle von X war eine Reihe von DDoS-Attacken verantwortlich, die auf ungeschützte Server gezielt haben. Ausgeführt haben sie Kameras und Rekorder.</p><p><a href="https://www.heise.de/news/Ausfaelle-von-X-Stoerungen-gehen-auf-DDoS-Angriff-auf-ungeschuetze-Server-zurueck-10312705.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Ausfaelle-von-X-</span><span class="invisible">Stoerungen-gehen-auf-DDoS-Angriff-auf-ungeschuetze-Server-zurueck-10312705.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
PrivacyDigest<p>Thousands of <a href="https://mas.to/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread malware | Tom's Guide</p><p>report from the Cato CTRL team, the <a href="https://mas.to/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> botnet <a href="https://mas.to/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> a remote code execution vulnerability that directly impacts the TP-Link Archer AX-21 router.</p><p>The botnet can lead to command injection which then makes remote code execution (RCE) possible so that the <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> can spread itself across the internet automatically. has also been used to spread other <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> families</p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
The New Oil<p>Unpatched <a href="https://mastodon.thenewoil.org/tags/Edimax" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Edimax</span></a> <a href="https://mastodon.thenewoil.org/tags/IPCamera" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPCamera</span></a> flaw actively exploited in <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
PrivacyDigest<p>Massive <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> that appeared overnight is delivering record-size DDoSes <br><a href="https://mas.to/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/</span></a></p>
PrivacyDigest<p>A Brand New <a href="https://mas.to/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> Is Delivering Record-Size <a href="https://mas.to/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> Attacks</p><p><a href="https://mas.to/tags/Eleven11bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Eleven11bot</span></a> infects <a href="https://mas.to/tags/webcams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webcams</span></a> and video recorders, with a large concentration in the US.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://www.wired.com/story/eleven11bot-botnet-record-size-ddos-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/eleven11bot-bo</span><span class="invisible">tnet-record-size-ddos-attacks/</span></a></p>
The Spamhaus Project<p>Starting around 2:00 AM UTC on March 4th, we've been observing a vast botnet operation attempting to use SMTP-AUTH credentials from nearly 500K distinct IPs - to perform what looks like a large scale phishing campaign targeting Brazilian users. </p><p>Here's what we know:</p><p>1️⃣ Subject lines used include: </p><p>Evite a Suspensão da Sua Caixa de Entrada<br>Saiba Como-XXXXXX<br>Sua Capacidade de E-mail Está no Máximo<br>Solução Disponível-XXXXXX<br>Atualize Sua Conta para Continuar Recebendo Novas Mensagens</p><p>2️⃣ Phishing payload is located at: hXXps://acessoclientevalidar.dnsalias[.]com/</p><p>3️⃣ Of particular interest is the fact that the IPs involved in this campaign are overwhelmingly located in Brazil too.</p><p>4️⃣ Based on what we and others know about the systems performing this phishing campaign, there appears to be a strict correlation with IPs associated with residential proxy networks.</p><p>5️⃣ Out of 373K Brazilian IPs involved, over 90% are associated with residential proxy networks.</p><p><a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/ResidentialProxies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ResidentialProxies</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
Frankie ✅<p>Massive botnet that appeared overnight is delivering record-size DDoSes</p><p>Eleven11bot infects video recorders, with the largest concentration of them in the US. </p><p><a href="https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/</span></a> </p><p><a href="https://mastodon.social/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://mastodon.social/tags/eleven11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eleven11</span></a> <a href="https://mastodon.social/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a></p>