February 3rd REDSHORT — PRESENTATION of A New Botnet Emerges, FreakOut! Infecting Linux devices to perform various malicious activities. Red Sky Analysts will provide an analysis of the malware's operation, capabilities, and how to defend against it. Join us to find out more: https://attendee.gotowebinar.com/register/3702558539639477516
Showing posts with label botnet. Show all posts
Showing posts with label botnet. Show all posts
Tuesday, February 2, 2021
Monday, April 8, 2019
316K Victims of Smominru Cryptocurrency Mining Botnet
Beginning in August of 2017, a new cryptocurrency mining botnet, dubbed Smominru, started propagating via the recently leaked Eternal Blue exploit. Smominru, aka MyKings, is characterized by the targeting of Windows systems using WMI as a file-less persistence mechanism.[1]
As of March 2019, Smominru showed no signs of slowing down. Wapack Labs has identified approximately 316K victims connecting to Smominru infrastructure over a period of 6 days. This report provides a high-level overview of the malware installation as well as details on the Smominru infrastructure and botnet.
To read the full article and find an archive of related reporting, follow this link to READBOARD.
WWW.WAPACKLABS.COM
As of March 2019, Smominru showed no signs of slowing down. Wapack Labs has identified approximately 316K victims connecting to Smominru infrastructure over a period of 6 days. This report provides a high-level overview of the malware installation as well as details on the Smominru infrastructure and botnet.
To read the full article and find an archive of related reporting, follow this link to READBOARD.
WWW.WAPACKLABS.COM
Tuesday, November 21, 2017
Reaper IoT Botnet Exploits and Mitigations

TLP AMBER ANNOUNCEMENT:
The Reaper IoT is a recently discovered Internet of Things (IoT) botnet that is proving to be more sophisticated and aggressive than the infamous 2016 Mirai IoT botnet. Despite the large botnet size reported by Tenable, there are very few IoT Reaper specimens available on Virus Total and other malware sharing sites. This is important to note as the number of specimens is often a reflection of the amount of infections. For example, there are currently thousands of Mirai specimens as opposed to a few dozen IoT Reaper specimens available. To date, no Distributed Denial of Service (DDoS) attacks have been observed with the IoT Reaper botnet. Wapack Labs analysts are providing this document as a summary of mitigations and indicators for Reaper malware and observed exploits. Wapack Labs recommends testing of all signatures before deployment...READ MORE
Wapack Labs has cataloged and reported on IoT and botnets in the past. An archive of related reporting can be found in the Red Sky Alliance portal.
This TLP AMBER report is available only to Red Sky Alliance members.
Tuesday, September 12, 2017
Warhorse Botnet and Attack Framework

Wapack Labs has cataloged and reported extensively on botnets and malware in the past. An archive of related reporting can be found in the Red Sky Alliance portal.
Labels:
anti-virus,
botnet,
cyber,
javascript,
malware
Tuesday, May 9, 2017
Nature is Bullet Proof: Dark Cloud

Wapack Labs has cataloged and reported extensively on malware in the past. An archive of related reporting can be found in the Red Sky Alliance portal.
WWW.WAPACKLABS.COM
Labels:
botnet,
bullet proof,
Dark Cloud,
fast-flux,
malware,
proxy
Tuesday, February 28, 2017
For Sale: W-2s and the GozNym Botnet

Wapack Labs has extensively reported on botnets in the past. An archive of related reporting can be found in the Red Sky Alliance Portal.
TLP: AMBER
ACTOR TYPE: (III)
SERIAL: IA-004-2017
COUNTRIES: US, EU
INDUSTRIES: Financial
REPORT DATE: 20170221
Wednesday, November 16, 2016
Russian Hacker Monetizes Traffic
A Russian hacker has been operating in the Russian underground for over 10 years; carrying out activities that range from stealing and distributing credit card data to hacking pharmacy-related websites in order to monetize their traffic. Known actor was observed working with another Russian speaking hacker, which possibly connects actor to the gang that operated several botnets.
Labels:
botnet,
credit card,
hacker,
Russia
Subscribe to:
Posts (Atom)