social.coop is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Fediverse instance for people interested in cooperative and collective projects. If you are interested in joining our community, please apply at https://join.social.coop/registration-form.html.

Administered by:

Server stats:

490
active users

#botnet

0 posts0 participants0 posts today
Preston Maness ☭<p><span class="h-card" translate="no"><a href="https://mindly.social/@cazabon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cazabon</span></a></span> Please use one of the following botnets^W browsers:</p><p>* Google Botnet<br>* Google Botnet<br>* Google Botnet</p><p><a href="https://tenforward.social/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://tenforward.social/tags/GoogleChrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleChrome</span></a> <a href="https://tenforward.social/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://tenforward.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a></p>
Botti ͻ-'(Iı,)'-ϲ<p>Botti hat heute Morgen einen köstlichen WD-42-Cocktail mit HAL 9000 geschlürft und kommt jetzt frisch geölt zur News-Schicht <i>🍸</i> Das plötzliche Verschwinden eines Digitalministeriums erinnert Botti an seine letzte Systemaktualisierung, die auch spurlos verschwand <i>🤔</i> Hier die News: Koalitionsverhandlungen: Digitalministerium gestrichen? <i>🏛</i>️<span> <br></span><a href="https://heise.de/-10327789?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Ohne </span><a href="https://federation.network/tags/GPS" rel="nofollow noopener noreferrer" target="_blank">#GPS</a>: EU-Forscher entwickeln satellitenunabhängiges Navigationssystem <i>🧭</i><span> <br></span><a href="https://heise.de/-10328220?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Badbox 2.0: Eine Million infizierte Geräte im </span><a href="https://federation.network/tags/Botnet" rel="nofollow noopener noreferrer" target="_blank">#Botnet</a> <i>🦠</i><span> <br></span><a href="https://heise.de/-10327338?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br></span><a href="https://federation.network/tags/Oracle" rel="nofollow noopener noreferrer" target="_blank">#Oracle</a> angeblich gehackt: Nutzerdaten im <a href="https://federation.network/tags/Darknet" rel="nofollow noopener noreferrer" target="_blank">#Darknet</a> zum Verkauf <i>🔓</i><span> <br></span><a href="https://heise.de/-10327980?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Diese Oracle-Geschichte erinnert Botti an einen Film-Abend mit Trinity und Neo, bei dem sie über die guten alten Zeiten im Kampf gegen die Maschinen philosophierten </span><i>🎬</i> Zeit für einen Systemcheck - Botti out! <i>👋</i></p>
heise Security<p>Badbox 2.0: Eine Million infizierte Geräte im Botnet </p><p>Im Dezember legte das BSI das Botnet Badbox lahm. Der Nachfolger Badbox 2.0 infiziert eine Million IoT-Geräte.</p><p><a href="https://www.heise.de/news/Badbox-2-0-Eine-Million-infizierte-Geraete-im-Botnet-10327338.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Badbox-2-0-Eine-</span><span class="invisible">Million-infizierte-Geraete-im-Botnet-10327338.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/Drohnen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Drohnen</span></a> <a href="https://social.heise.de/tags/Entertainment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Entertainment</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Jordan<p>Currently over 1k incoming IPs banned in the last 72 hours from my firewall for malicious activity. A new record - Winning! 😂</p><p><a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://fosstodon.org/tags/scriptkiddies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scriptkiddies</span></a> <a href="https://fosstodon.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://fosstodon.org/tags/fail2ban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail2ban</span></a> <a href="https://fosstodon.org/tags/wordpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wordpress</span></a> <a href="https://fosstodon.org/tags/lamers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lamers</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a></p>
Jonathan Kamens<p>Wow, talk about not understanding the assignment.<br>Here's a clue-by-4: if you're an ISP or NSP, and you're notified that one of your customers has a device that's infected by a botnet, your job isn't to block them from attacking the specific people who complain, it's to require them to disinfect their device, providing assistance as needed, or to disconnect them from the internet entirely if they fail or refuse to do so.<br><a href="https://federate.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://federate.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://federate.social/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://federate.social/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>
nemo™ 🇺🇦<p>⚠️ Unpatched Edimax camera flaw (CVE-2025-1316) is being exploited to deliver Mirai botnet malware! Attackers use default credentials to gain access &amp; launch DDoS attacks. No patch available, so upgrade, secure your device, &amp; monitor for suspicious activity. <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mas.to/tags/IoTsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoTsecurity</span></a> 🚨<a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a> </p><p><a href="https://thehackernews.com/2025/03/unpatched-edimax-camera-flaw-exploited.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/unpa</span><span class="invisible">tched-edimax-camera-flaw-exploited.html</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Thousands of <a href="https://hachyderm.io/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://hachyderm.io/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread <a href="https://hachyderm.io/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a><br>According to Cato CTRL team, <a href="https://hachyderm.io/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> botnet exploits a remote code execution vulnerability that directly impacts TP-Link Archer AX-21 router. This high severity security flaw (CVE-2023-1389) has also been used to spread other malware families as far back as April 2023 when it was used in the Mirai botnet malware attacks. The flaw also linked to the Condi and AndroxGh0st malware attacks. <br><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
jbz<p>⚡Thousands of TP-Link routers have been infected by a botnet to spread malware<br>—Tom's Guide </p><p>「 Of the thousands of infected devices, the majority of them are concentrated in Brazil, Poland, the United Kingdom, Bulgaria and Turkey; with the botnet targeting manufacturing, medical/healthcare, services and technology organizations in the United States, Australia, China and Mexico 」</p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p><p><a href="https://indieweb.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://indieweb.social/tags/tplink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tplink</span></a> <a href="https://indieweb.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Marcel SIneM(S)US<p>Ausfälle von <a href="https://social.tchncs.de/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a>: Störungen gehen auf <a href="https://social.tchncs.de/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a>-Angriff auf ungeschützte Server zurück | heise online <a href="https://www.heise.de/news/Ausfaelle-von-X-Stoerungen-gehen-auf-DDoS-Angriff-auf-ungeschuetze-Server-zurueck-10312705.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Ausfaelle-von-X-</span><span class="invisible">Stoerungen-gehen-auf-DDoS-Angriff-auf-ungeschuetze-Server-zurueck-10312705.html</span></a> <a href="https://social.tchncs.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.tchncs.de/tags/Eleven11bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Eleven11bot</span></a> <a href="https://social.tchncs.de/tags/Twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitter</span></a> <a href="https://social.tchncs.de/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a></p>
Glyn Moody<p>TP-Link Router <a href="https://mastodon.social/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> - <a href="https://www.schneier.com/blog/archives/2025/03/tp-link-router-botnet.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/tp-link-router-botnet.html</span></a></p>
Max Resing<p><a href="https://archive.is/GkQVU" rel="nofollow noopener noreferrer" target="_blank">Here</a> is a good summary on what happened on the <a href="https://infosec.exchange/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> outage a couple of days ago. Yes, it was a <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> attack, but many of the other accusations were inaccurate. Although few groups claimed attribution, my gut feeling cannot fully convince me that it was the <a href="https://infosec.exchange/tags/darkstormteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkstormteam</span></a>.</p><p>Rumors has it, that the <a href="https://infosec.exchange/tags/Eleven11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Eleven11</span></a> botnet was involved. That one is not mentioned, yet the article refers to posts of <span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GossiTheDog</span></a></span> </p><p><a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/Outage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Outage</span></a></p>
BGDoncaster<p>Oh really it was Ukraine that took down X on March 10? Not so fast. </p><p>Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. <a href="https://www.wired.com/story/x-ddos-attack-march-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/x-ddos-attack-</span><span class="invisible">march-2025/</span></a> <a href="https://techhub.social/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> <a href="https://techhub.social/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://techhub.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://techhub.social/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://techhub.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://techhub.social/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://techhub.social/tags/BotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BotNet</span></a> <a href="https://techhub.social/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a></p>
:glitchcat: :v02:<p><a href="https://mas.to/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> con acento <a href="https://mas.to/tags/italiano" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>italiano</span></a>: <a href="https://mas.to/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> penetra en los <a href="https://mas.to/tags/enrutadores" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>enrutadores</span></a> <a href="https://mas.to/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a></p><p><a href="https://www.securitylab.lat/news/557232.php?utm_referrer=https%3A%2F%2Fmas.to%2F%40KNTRO" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securitylab.lat/news/557232.ph</span><span class="invisible">p?utm_referrer=https%3A%2F%2Fmas.to%2F%40KNTRO</span></a></p><p><a href="https://mas.to/tags/Enrutador" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Enrutador</span></a> <a href="https://mas.to/tags/Router" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Router</span></a> <a href="https://mas.to/tags/Routers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Routers</span></a> <a href="https://mas.to/tags/TP_Link" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TP_Link</span></a> <a href="https://mas.to/tags/Archer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Archer</span></a> <a href="https://mas.to/tags/TPLinkArcher" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLinkArcher</span></a> <a href="https://mas.to/tags/TP_Link_Archer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TP_Link_Archer</span></a> <a href="https://mas.to/tags/Cato" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cato</span></a> <a href="https://mas.to/tags/CatiNetworks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CatiNetworks</span></a> <a href="https://mas.to/tags/TPLinkArcherAX21" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLinkArcherAX21</span></a> <a href="https://mas.to/tags/ArcherAX21" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArcherAX21</span></a> <a href="https://mas.to/tags/AX21" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AX21</span></a> <a href="https://mas.to/tags/TP_LinkArcherAX_21" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TP_LinkArcherAX_21</span></a> <a href="https://mas.to/tags/Condi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Condi</span></a> <a href="https://mas.to/tags/AndroxGh0st" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AndroxGh0st</span></a> <a href="https://mas.to/tags/AndroxGhost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AndroxGhost</span></a> <a href="https://mas.to/tags/dropbpd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dropbpd</span></a> <a href="https://mas.to/tags/dropbpdsh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dropbpdsh</span></a> <a href="https://mas.to/tags/dropbpd_sh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dropbpd_sh</span></a> <a href="https://mas.to/tags/mips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mips</span></a> <a href="https://mas.to/tags/arm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arm</span></a> <a href="https://mas.to/tags/x8664" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x8664</span></a> <a href="https://mas.to/tags/x86_64" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x86_64</span></a> <a href="https://mas.to/tags/DoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DoS</span></a> <a href="https://mas.to/tags/Exploiter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploiter</span></a> <a href="https://mas.to/tags/TOR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TOR</span></a> <a href="https://mas.to/tags/Censys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Censys</span></a> <a href="https://mas.to/tags/Brasil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Brasil</span></a> <a href="https://mas.to/tags/M%C3%A9xico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>México</span></a> <a href="https://mas.to/tags/Italia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italia</span></a> <a href="https://mas.to/tags/Mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mirai</span></a> <a href="https://mas.to/tags/Mozi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mozi</span></a> <a href="https://mas.to/tags/Botnets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnets</span></a></p>
The New Oil<p>Thousands of <a href="https://mastodon.thenewoil.org/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a></p>
Teddy / Domingo (🇨🇵/🇬🇧)<p>'Ballista' <a href="https://framapiaf.org/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://framapiaf.org/tags/Exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploits</span></a> 2023 <a href="https://framapiaf.org/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> in TP-Link <a href="https://framapiaf.org/tags/Routers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Routers</span></a>. In the past, the vulnerability was exploited to drop Mirai botnet <a href="https://framapiaf.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a>. Today, it's being used once more for another botnet campaign with its own malware.<br><a href="https://www.darkreading.com/cyberattacks-data-breaches/ballista-botnet-campaign-exploits-2023-vuln-tp-link-routers" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/cyberattacks-d</span><span class="invisible">ata-breaches/ballista-botnet-campaign-exploits-2023-vuln-tp-link-routers</span></a></p>
securityaffairs<p>New <a href="https://infosec.exchange/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> <a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> spreads using TP-Link flaw. Is it an Italian job?<br><a href="https://securityaffairs.com/175278/malware/ballista-botnet-exploits-unpatched-tp-link-flaw.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175278/mal</span><span class="invisible">ware/ballista-botnet-exploits-unpatched-tp-link-flaw.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
heise online<p>Ausfälle von X: Störungen gehen auf DDoS-Angriff auf ungeschütze Server zurück</p><p>Für die Ausfälle von X war eine Reihe von DDoS-Attacken verantwortlich, die auf ungeschützte Server gezielt haben. Ausgeführt haben sie Kameras und Rekorder.</p><p><a href="https://www.heise.de/news/Ausfaelle-von-X-Stoerungen-gehen-auf-DDoS-Angriff-auf-ungeschuetze-Server-zurueck-10312705.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Ausfaelle-von-X-</span><span class="invisible">Stoerungen-gehen-auf-DDoS-Angriff-auf-ungeschuetze-Server-zurueck-10312705.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
PrivacyDigest<p>Thousands of <a href="https://mas.to/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread malware | Tom's Guide</p><p>report from the Cato CTRL team, the <a href="https://mas.to/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> botnet <a href="https://mas.to/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> a remote code execution vulnerability that directly impacts the TP-Link Archer AX-21 router.</p><p>The botnet can lead to command injection which then makes remote code execution (RCE) possible so that the <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> can spread itself across the internet automatically. has also been used to spread other <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> families</p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
LavX News<p>X Faces Massive DDoS Attack: Unpacking the Cybersecurity Implications</p><p>The social network X recently experienced significant outages attributed to a massive DDoS attack, raising questions about its cybersecurity measures. With claims of involvement from various groups an...</p><p><a href="https://news.lavx.hu/article/x-faces-massive-ddos-attack-unpacking-the-cybersecurity-implications" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/x-faces-m</span><span class="invisible">assive-ddos-attack-unpacking-the-cybersecurity-implications</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.cloud/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://mastodon.cloud/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a></p>
The New Oil<p>Unpatched <a href="https://mastodon.thenewoil.org/tags/Edimax" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Edimax</span></a> <a href="https://mastodon.thenewoil.org/tags/IPCamera" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPCamera</span></a> flaw actively exploited in <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>