Advertisement · 728 × 90
#
Hashtag
#Botnetattack
Advertisement · 728 × 90
Preview
Head of Russian Cybercrime Group Mario Kart Sentenced for Locking Out Dozens of U.S. Businesses A federal court sentenced Russian national Illya Angelov for operating the Mario Kart botnet that infected thousands of computers daily and sold backdoor access to ransomware groups, victimizing 72 companies across 31 U.S. states. Angelov pleaded guilty and received a reduced 61-month sentence, a $100,000 fine, and a $1.6 million money...

Illya Angelov, leader of the Mario Kart botnet, sentenced to 61 months, fined $100K, and ordered to pay $1.6M for infecting 3,000 computers daily and targeting 72 U.S. companies across 31 states. #RansomwareSupply #BotnetAttack #Russia

0 0 0 0
Preview
Global Law Enforcement Disrupts SocksEscort Proxy Network Powered by AVRecon Malware  Federal and regional police units, working alongside independent digital security experts, took down the SocksEscort hacking infrastructure. This setup used hacked gateway gadgets - infected by AVRecon - to route illicit online traffic through hidden channels.  A team at Black Lotus Labs, under Lumen Technologies, aided the takedown operation together with officials from the U.S. Department of Justice. Over multiple years, authorities found the proxy system kept around twenty thousand compromised gadgets active weekly - revealing both reach and staying power.  SocksEscort first came into view back in 2023, though signs point to activity stretching well beyond ten years. Operation relied on offering entry to seemingly legitimate IP addresses - pulled from home and office network devices. Because these connections appeared ordinary, users could mask malicious data flows under normal ISP cover. Detection tools often failed, misled by the everyday digital footprint left behind.  By early 2026, authorities reported the system had provided entry to vast numbers of IP addresses across its lifespan. Nearly 8,000 compromised routers remained operational at that point. Within the U.S., roughly a quarter of those devices were found scattered throughout the country. Though focused on one case, the ripple effects touched various forms of monetary misconduct.  A trail led authorities to connect SocksEscort with nearly $1 million siphoned from digital wallets belonging to someone in New York. Separate findings showed about $700,000 lost due to deceptive schemes targeting an industrial company based in Pennsylvania. Victims among American military personnel also faced damage after personal banking records were breached, adding further strain.  Dozens of domains and servers linked to the network were seized across Europe through joint efforts steered by Europol. Backing came from law enforcement agencies in Austria, France, and the Netherlands. Around $3.5 million in digital currency was blocked during the course of the mission. What powered the entire operation was AVRecon, a form of malicious software aimed at Linux-run home and small office routers.  By June 2023, it had taken hold on over seventy thousand machines, forming a vast network of hijacked devices. This network served one purpose: strengthening the reach of SocksEscort. Analysts found something unusual - none of the affected IPs showed up in unrelated botnet activity, pointing toward tightly managed usage. Despite setbacks during early 2023 that briefly disrupted operations through severed command channels, the group managed recovery by reconstructing systems. Control returned via decentralized nodes rather than a single hub. Activity restarted months afterward with modified communication pathways.  Early in 2025, more than 280,000 distinct IP addresses got caught up in the activity. Although infections spread globally, those based in the U.S. and the U.K. stood out - due to their appeal in hiding harmful network behavior. Outdated routers should be swapped out, many professionals suggest. Firmware updates come next on the list for staying protected. Default login details? Better revise them promptly. Remote functions that go unused tend to invite trouble - shutting those off helps block intrusions. Reducing exposure often begins with these small shifts.  A single operation reveals how digital crime groups using hidden relay systems are expanding their reach. Global teamwork across borders proves essential to weaken such operations.

Global Law Enforcement Disrupts SocksEscort Proxy Network Powered by AVRecon Malware #Botnet #Botnetattack #CyberSecurity

0 0 0 0
Preview
How The AWS Outage Botnet Exposed A Global IoT Weakness That No One Saw Coming The AWS outage botnet attack shows how one disruption allowed a Mirai variant to infect devices across 28 countries.

How the AWS Outage Botnet Exposed a Global IoT Weakness That No One Saw Coming #CyberSecurity #IoT #AWSOutage #BotnetAttack
www.squaredtech.co/aws-outage-b...

1 0 0 0
Preview
Palo Alto Detects New Prometei Botnet Attacks Targeting Linux Servers Cybersecurity analysts from Palo Alto Networks’ Unit 42 have reported a resurgence of the Prometei botnet, now actively targeting Linux systems with new, upgraded variants as of March 2025. Originally discovered in 2020 when it was aimed at Windows machines, Prometei has since expanded its reach.  Its Linux-based malware strain has been in circulation since late 2020, but recent versions—designated as 3.x and 4.x—demonstrate significant upgrades in their attack capabilities. The latest Prometei malware samples are equipped with remote control functionality, domain generation algorithms (DGA) to ensure connection with attacker-controlled servers, and self-updating systems that help them remain undetected. This renewed activity highlights the botnet’s growing sophistication and persistent threat across global networks.  At its core, Prometei is designed to secretly mine Monero cryptocurrency, draining the resources of infected devices. However, it also engages in credential harvesting and can download additional malicious software depending on the attacker’s goals. Its modular framework allows individual components to carry out specific tasks, including brute-force attacks, vulnerability exploitation (such as EternalBlue and SMB bugs), mining operations, and data exfiltration.  The malware is typically delivered via HTTP GET requests from rogue URLs like hxxp://103.41.204[.]104/k.php. Prometei uses 64-bit Linux ELF binaries that extract and execute payloads directly in memory. These binaries also carry embedded configuration data in a JSON format, containing fields such as encryption keys and tracking identifiers, making them harder to analyze and block.  Once a system is compromised, the malware collects extensive hardware and software information—CPU details, OS version, system uptime—and sends this back to its command-and-control (C2) servers, including addresses like hxxp://152.36.128[.]18/cgi-bin/p.cgi. Thanks to DGA and self-update features, Prometei ensures consistent communication with attacker infrastructure and adapts to security responses on the fly.   To defend against these threats, Palo Alto Networks advises using advanced detection tools such as Cortex XDR, WildFire, and their Advanced Threat Prevention platform. These technologies utilize real-time analytics and machine learning to identify and contain threats. Organizations facing a breach can also contact Palo Alto’s Unit 42 incident response team for expert help.  The activity observed from March to April 2025 underlines the continued evolution of the Prometei botnet and the growing risk it poses to businesses relying on Linux environments. Strengthening cybersecurity protocols and remaining alert to new threats is essential in today’s threat landscape.

Palo Alto Detects New Prometei Botnet Attacks Targeting Linux Servers #Botnet #Botnetattack #cryptocurrencymining

0 0 1 0
Preview
Mirai Botnet Exploits TBK DVR Vulnerability (CVE-2024-3721) A new Mirai botnet variant exploits CVE-2024-3721 to hijack TBK DVR devices via command injection, risking massive IoT attacks. Stay protected

🚨Mirai Malware Targets Unpatched TBK DVRs in Global Botnet Campaign🚨 Contact for Security support@wiretor.com

Read: wiretor.com/mirai-botnet...

#MiraiBotnet, #CVE20243721, #IoTSecurity, #CyberSecurity, #DVRExploit, #BotnetAttack, #WireTor, #PenetrationTesting, #ThreatDetection, #InfoSec

0 0 0 0