Researchers uncover SSHStalker, an IRC botnet exploiting legacy Linux flaws and SSH servers to build persistent covert access.
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.
A new version of the Miori botnet added protection to the login panel of its command and control server, hanging a "not welcome" message for connections likely coming from a security researcher. Until ...
Using an on-again, off-again strategy of C2 communication helps it hide from researchers. Necurs, the prolific and globally dispersed spam and malware distribution botnet, has been spotted using a ...
A novel Go-based Linux botnet, dubbed "PumaBot," has been observed targeting Internet of Things (IoT) devices. PumaBot differentiates itself from typical botnets by remotely retrieving a list of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results