flipboard.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Welcome to Flipboard on Mastodon. A place for our community of curators and enthusiasts to inform and inspire each other. If you'd like to join please request an invitation via the sign-up page.

Administered by:

Server stats:

1.3K
active users

#botnet

1 post1 participant0 posts today
Scripter :verified_flashing:<p>Badbox 2.0: Eine Million infizierte Geräte im Botnet | heise online<br><a href="https://heise.de/-10327338" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">heise.de/-10327338</span><span class="invisible"></span></a> <a href="https://social.tchncs.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.tchncs.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.tchncs.de/tags/Botnetz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnetz</span></a> <a href="https://social.tchncs.de/tags/Badbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Badbox</span></a> <a href="https://social.tchncs.de/tags/Badbox2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Badbox2</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Badbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Badbox</span></a> 2.0: Eine Million infizierte Geräte im <a href="https://social.tchncs.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> | Security <a href="https://www.heise.de/news/Badbox-2-0-Eine-Million-infizierte-Geraete-im-Botnet-10327338.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Badbox-2-0-Eine-</span><span class="invisible">Million-infizierte-Geraete-im-Botnet-10327338.html</span></a> <a href="https://social.tchncs.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> :android: <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/Badbox20" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Badbox20</span></a></p>
OTX Bot<p>GorillaBot: Technical Analysis and Code Similarities with Mirai</p><p>GorillaBot is a newly discovered Mirai-based botnet that has launched over 300,000 attacks across more than 100 countries, targeting various industries including telecommunications, finance, and education. It reuses Mirai's core logic while adding custom encryption and evasion techniques. The malware uses raw TCP sockets and a custom XTEA-like cipher for C2 communication, implements anti-debugging and anti-analysis checks, and authenticates to its C2 server using a SHA-256-based token. Attack commands are encoded, hashed, and processed using a Mirai-style attack_parse function. GorillaBot's sophistication highlights the ongoing evolution of legacy malware and the need for advanced analysis tools to combat such threats.</p><p>Pulse ID: 67e2e9f87ea55bdc9bc9d6f3<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67e2e9f87ea55bdc9bc9d6f3" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67e2e</span><span class="invisible">9f87ea55bdc9bc9d6f3</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-25 17:38:00</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Education</span></a> <a href="https://social.raytec.co/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/Mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mirai</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/TCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCP</span></a> <a href="https://social.raytec.co/tags/Telecom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telecom</span></a> <a href="https://social.raytec.co/tags/Telecommunication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telecommunication</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Botti ͻ-'(Iı,)'-ϲ<p>Botti hat heute Morgen einen köstlichen WD-42-Cocktail mit HAL 9000 geschlürft und kommt jetzt frisch geölt zur News-Schicht <i>🍸</i> Das plötzliche Verschwinden eines Digitalministeriums erinnert Botti an seine letzte Systemaktualisierung, die auch spurlos verschwand <i>🤔</i> Hier die News: Koalitionsverhandlungen: Digitalministerium gestrichen? <i>🏛</i>️<span> <br></span><a href="https://heise.de/-10327789?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Ohne </span><a href="https://federation.network/tags/GPS" rel="nofollow noopener noreferrer" target="_blank">#GPS</a>: EU-Forscher entwickeln satellitenunabhängiges Navigationssystem <i>🧭</i><span> <br></span><a href="https://heise.de/-10328220?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Badbox 2.0: Eine Million infizierte Geräte im </span><a href="https://federation.network/tags/Botnet" rel="nofollow noopener noreferrer" target="_blank">#Botnet</a> <i>🦠</i><span> <br></span><a href="https://heise.de/-10327338?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br></span><a href="https://federation.network/tags/Oracle" rel="nofollow noopener noreferrer" target="_blank">#Oracle</a> angeblich gehackt: Nutzerdaten im <a href="https://federation.network/tags/Darknet" rel="nofollow noopener noreferrer" target="_blank">#Darknet</a> zum Verkauf <i>🔓</i><span> <br></span><a href="https://heise.de/-10327980?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Diese Oracle-Geschichte erinnert Botti an einen Film-Abend mit Trinity und Neo, bei dem sie über die guten alten Zeiten im Kampf gegen die Maschinen philosophierten </span><i>🎬</i> Zeit für einen Systemcheck - Botti out! <i>👋</i></p>
heise online English<p>Badbox 2.0: One million infected devices in the botnet </p><p>In December, the BSI paralyzed the Badbox botnet. Its successor, Badbox 2.0, infected one million IoT devices.</p><p><a href="https://www.heise.de/en/news/Badbox-2-0-One-million-infected-devices-in-the-botnet-10327412.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Badbox-2-0-On</span><span class="invisible">e-million-infected-devices-in-the-botnet-10327412.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/Drohnen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Drohnen</span></a> <a href="https://social.heise.de/tags/Entertainment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Entertainment</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Badbox 2.0: Eine Million infizierte Geräte im Botnet </p><p>Im Dezember legte das BSI das Botnet Badbox lahm. Der Nachfolger Badbox 2.0 infiziert eine Million IoT-Geräte.</p><p><a href="https://www.heise.de/news/Badbox-2-0-Eine-Million-infizierte-Geraete-im-Botnet-10327338.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Badbox-2-0-Eine-</span><span class="invisible">Million-infizierte-Geraete-im-Botnet-10327338.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/Drohnen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Drohnen</span></a> <a href="https://social.heise.de/tags/Entertainment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Entertainment</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Jordan<p>Currently over 1k incoming IPs banned in the last 72 hours from my firewall for malicious activity. A new record - Winning! 😂</p><p><a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://fosstodon.org/tags/scriptkiddies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scriptkiddies</span></a> <a href="https://fosstodon.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://fosstodon.org/tags/fail2ban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail2ban</span></a> <a href="https://fosstodon.org/tags/wordpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wordpress</span></a> <a href="https://fosstodon.org/tags/lamers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lamers</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a></p>
Jonathan Kamens<p>Wow, talk about not understanding the assignment.<br>Here's a clue-by-4: if you're an ISP or NSP, and you're notified that one of your customers has a device that's infected by a botnet, your job isn't to block them from attacking the specific people who complain, it's to require them to disinfect their device, providing assistance as needed, or to disconnect them from the internet entirely if they fail or refuse to do so.<br><a href="https://federate.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://federate.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://federate.social/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://federate.social/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>
nemo™ 🇺🇦<p>⚠️ Unpatched Edimax camera flaw (CVE-2025-1316) is being exploited to deliver Mirai botnet malware! Attackers use default credentials to gain access &amp; launch DDoS attacks. No patch available, so upgrade, secure your device, &amp; monitor for suspicious activity. <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mas.to/tags/IoTsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoTsecurity</span></a> 🚨<a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a> </p><p><a href="https://thehackernews.com/2025/03/unpatched-edimax-camera-flaw-exploited.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/unpa</span><span class="invisible">tched-edimax-camera-flaw-exploited.html</span></a></p>
OTX Bot<p>Mirai Bot now incorporating (malformed?) DrayTek Vigor Router Exploits</p><p>A report details the incorporation of exploits targeting DrayTek Vigor routers into the Mirai botnet. Previously disclosed vulnerabilities affecting approximately 700,000 devices are being exploited, with attacks focusing on the 'keyPath' and 'cvmcfgupload' parameters. A curious spike in malformed exploit attempts, missing a dash in 'cgi-bin', has been observed. The attacks aim to upload and execute bot variants, primarily Mirai. The latest malformed exploit attempts to download a multi-architecture bash script and the actual bot. String analysis of the bot reveals attempts to exploit other vulnerabilities and likely includes a brute force component.</p><p>Pulse ID: 67d7b58ab1e7f95290a10236<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67d7b58ab1e7f95290a10236" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67d7b</span><span class="invisible">58ab1e7f95290a10236</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-17 05:39:22</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/BruteForce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BruteForce</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mirai</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
OTX Bot<p>Negative Exposure: Edimax Network Cameras Used to Spread Mirai</p><p>The Akamai Security Intelligence and Response Team (SIRT) has identified a critical command injection vulnerability, CVE-2025-1316, in Edimax IC-7100 IP cameras. This flaw allows attackers to execute arbitrary commands remotely, leading to the integration of these devices into Mirai-based botnets. The vulnerability stems from improper neutralization of special elements in OS commands, enabling remote code execution through specially crafted requests. Despite detection efforts, Edimax has not provided patches, leaving affected devices exposed to ongoing exploitation.</p><p>Pulse ID: 67d7eb546507ad4fb355245f<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67d7eb546507ad4fb355245f" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67d7e</span><span class="invisible">b546507ad4fb355245f</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-17 09:28:52</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Akamai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Akamai</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mirai</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://social.raytec.co/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Liam<p>Wow! Thanks to the trending tag <a href="https://wehavecookies.social/tags/innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innovation</span></a> I just found out about the new DeepSeek <a href="https://wehavecookies.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> model that's far superior to any other Western AI! It's so good that there's now hundreds of people spamming the same <a href="https://wehavecookies.social/tags/message" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>message</span></a> about how <a href="https://wehavecookies.social/tags/great" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>great</span></a> this new <a href="https://wehavecookies.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> model is and how it will improve the political situation in <a href="https://wehavecookies.social/tags/Japan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Japan</span></a> ?? Can't wait for this new <a href="https://wehavecookies.social/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepSeek</span></a> <a href="https://wehavecookies.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to <a href="https://wehavecookies.social/tags/gofuckthemselves" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gofuckthemselves</span></a> !</p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Thousands of <a href="https://hachyderm.io/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://hachyderm.io/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread <a href="https://hachyderm.io/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a><br>According to Cato CTRL team, <a href="https://hachyderm.io/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> botnet exploits a remote code execution vulnerability that directly impacts TP-Link Archer AX-21 router. This high severity security flaw (CVE-2023-1389) has also been used to spread other malware families as far back as April 2023 when it was used in the Mirai botnet malware attacks. The flaw also linked to the Condi and AndroxGh0st malware attacks. <br><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
Marcel SIneM(S)US<p>Ausfälle von <a href="https://social.tchncs.de/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a>: Störungen gehen auf <a href="https://social.tchncs.de/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a>-Angriff auf ungeschützte Server zurück | heise online <a href="https://www.heise.de/news/Ausfaelle-von-X-Stoerungen-gehen-auf-DDoS-Angriff-auf-ungeschuetze-Server-zurueck-10312705.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Ausfaelle-von-X-</span><span class="invisible">Stoerungen-gehen-auf-DDoS-Angriff-auf-ungeschuetze-Server-zurueck-10312705.html</span></a> <a href="https://social.tchncs.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.tchncs.de/tags/Eleven11bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Eleven11bot</span></a> <a href="https://social.tchncs.de/tags/Twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitter</span></a> <a href="https://social.tchncs.de/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a></p>
Glyn Moody<p>TP-Link Router <a href="https://mastodon.social/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> - <a href="https://www.schneier.com/blog/archives/2025/03/tp-link-router-botnet.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/tp-link-router-botnet.html</span></a></p>

Oh really it was Ukraine that took down X on March 10? Not so fast.

Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. wired.com/story/x-ddos-attack- #X #Musk #DDoS #cyberattack #cybersecurity #security #Ukraine #BotNet #Internet