A botnet known as GoBruteforcer has been actively targeting Linux servers exposed to the internet, using large-scale brute-force attacks against common services such as FTP, MySQL, PostgreSQL and ...
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations. The protocol was invented in 1988, and its ...
A novel Go-based Linux botnet, dubbed "PumaBot," has been observed targeting Internet of Things (IoT) devices. PumaBot differentiates itself from typical botnets by remotely retrieving a list of ...
The RondoDox botnet has expanded its exploit list to 174 vulnerabilities, increased its activity, and shifted to more targeted exploitation.
A botnet targeting Internet of Things devices running on the Linux operating system works by brute forcing credentials and downloading cryptomining software. See Also: IoT and Cloud Systems Face ...
A newly discovered botnet is compromising poorly-protected Linux servers by brute-forcing weak SSH password login authentication. Researchers at Canada-based Flare Systems, who discovered the botnet, ...
SSHStalker uses IRC channels and multiple bots to control infected Linux hosts Automated SSH brute-forcing rapidly spreads the botnet through cloud server infrastructures Compilers are downloaded ...
A new botnet has been slowly growing over the past year by brute-forcing SSH logins and deploying cryptomining malware on Linux servers. The main bot client is based on the old Mirai worm whose source ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results