Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Cat 🐈🥗 (D.Burch) :paw:⁠:paw: boosted
Tim W RESISTS
Tim W RESISTS
@tim@union.place  ·  activity timestamp 4 weeks ago

Ruh roh. That feeling when you get the Google "we detected unusual activity from your computer or network" page and wonder if some IoT device on your network got popped...

Anyone know how to scan my network for #Kimwolf? (I don't THINK I have any old Android TVs but it's the big one of the moment I'm aware of...)

#CyberSec #Botnet

  • Copy link
  • Flag this post
  • Block
Cat 🐈🥗 (D.Burch) :paw:⁠:paw: boosted
BrianKrebs
BrianKrebs
@briankrebs@infosec.exchange  ·  activity timestamp 2 weeks ago

New, from me: Who Operates the Badbox 2.0 Botnet?

The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people behind Badbox 2.0, and thanks to bragging by the Kimwolf botmasters we may now have a much clearer idea about that.

https://krebsonsecurity.com/2026/01/who-operates-the-badbox-2-0-botnet/

#infosec #botnet #IoT #Android #Google #threatresearch

A web-based control panel, allegedly for the Badbox 2.0 botnet, at the ip address 45.134.212.95. This users panel lists seven authorized users, all but one of which have email addresses ending in the chinese email service qq.com. Two of the users on this list map directly to domains tied to the Badbox 2.0 botnet.
A web-based control panel, allegedly for the Badbox 2.0 botnet, at the ip address 45.134.212.95. This users panel lists seven authorized users, all but one of which have email addresses ending in the chinese email service qq.com. Two of the users on this list map directly to domains tied to the Badbox 2.0 botnet.
A web-based control panel, allegedly for the Badbox 2.0 botnet, at the ip address 45.134.212.95. This users panel lists seven authorized users, all but one of which have email addresses ending in the chinese email service qq.com. Two of the users on this list map directly to domains tied to the Badbox 2.0 botnet.

Who Operates the Badbox 2.0 Botnet?

The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software…
  • Copy link
  • Flag this post
  • Block
BrianKrebs
BrianKrebs
@briankrebs@infosec.exchange  ·  activity timestamp 2 weeks ago

New, from me: Who Operates the Badbox 2.0 Botnet?

The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people behind Badbox 2.0, and thanks to bragging by the Kimwolf botmasters we may now have a much clearer idea about that.

https://krebsonsecurity.com/2026/01/who-operates-the-badbox-2-0-botnet/

#infosec #botnet #IoT #Android #Google #threatresearch

A web-based control panel, allegedly for the Badbox 2.0 botnet, at the ip address 45.134.212.95. This users panel lists seven authorized users, all but one of which have email addresses ending in the chinese email service qq.com. Two of the users on this list map directly to domains tied to the Badbox 2.0 botnet.
A web-based control panel, allegedly for the Badbox 2.0 botnet, at the ip address 45.134.212.95. This users panel lists seven authorized users, all but one of which have email addresses ending in the chinese email service qq.com. Two of the users on this list map directly to domains tied to the Badbox 2.0 botnet.
A web-based control panel, allegedly for the Badbox 2.0 botnet, at the ip address 45.134.212.95. This users panel lists seven authorized users, all but one of which have email addresses ending in the chinese email service qq.com. Two of the users on this list map directly to domains tied to the Badbox 2.0 botnet.

Who Operates the Badbox 2.0 Botnet?

The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software…
  • Copy link
  • Flag this post
  • Block
Trending Bot boosted
BrianKrebs
BrianKrebs
@briankrebs@infosec.exchange  ·  activity timestamp 3 weeks ago

New, from me: The Kimwolf Botnet is Lurking in Corporate, Govt. Networks

A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf’s ability to scan the local networks of compromised systems for other IoT devices to infect makes it a sobering threat to organizations, and new research reveals Kimwolf is surprisingly prevalent in government and corporate networks.

https://krebsonsecurity.com/2026/01/kimwolf-botnet-lurking-in-corporate-govt-networks/

#botnet #infosec #IoT #DDoS #threatresearch #malware

An illustration showing the head of a robot with arrows pointing down to two computer screens below. The robot's head has antennae sticking out diagonally from the top of its square head, almost resembling a TV box.
An illustration showing the head of a robot with arrows pointing down to two computer screens below. The robot's head has antennae sticking out diagonally from the top of its square head, almost resembling a TV box.
An illustration showing the head of a robot with arrows pointing down to two computer screens below. The robot's head has antennae sticking out diagonally from the top of its square head, almost resembling a TV box.

Kimwolf Botnet Lurking in Corporate, Govt. Networks

A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf's ability to scan the local…
  • Copy link
  • Flag this post
  • Block
BrianKrebs
BrianKrebs
@briankrebs@infosec.exchange  ·  activity timestamp 3 weeks ago

New, from me: The Kimwolf Botnet is Lurking in Corporate, Govt. Networks

A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf’s ability to scan the local networks of compromised systems for other IoT devices to infect makes it a sobering threat to organizations, and new research reveals Kimwolf is surprisingly prevalent in government and corporate networks.

https://krebsonsecurity.com/2026/01/kimwolf-botnet-lurking-in-corporate-govt-networks/

#botnet #infosec #IoT #DDoS #threatresearch #malware

An illustration showing the head of a robot with arrows pointing down to two computer screens below. The robot's head has antennae sticking out diagonally from the top of its square head, almost resembling a TV box.
An illustration showing the head of a robot with arrows pointing down to two computer screens below. The robot's head has antennae sticking out diagonally from the top of its square head, almost resembling a TV box.
An illustration showing the head of a robot with arrows pointing down to two computer screens below. The robot's head has antennae sticking out diagonally from the top of its square head, almost resembling a TV box.

Kimwolf Botnet Lurking in Corporate, Govt. Networks

A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf's ability to scan the local…
  • Copy link
  • Flag this post
  • Block
Tim W RESISTS
Tim W RESISTS
@tim@union.place  ·  activity timestamp 4 weeks ago

Ruh roh. That feeling when you get the Google "we detected unusual activity from your computer or network" page and wonder if some IoT device on your network got popped...

Anyone know how to scan my network for #Kimwolf? (I don't THINK I have any old Android TVs but it's the big one of the moment I'm aware of...)

#CyberSec #Botnet

  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 3 months ago

Cloudflare Scrubs Aisuru Botnet from Top Domains List

https://krebsonsecurity.com/2025/11/cloudflare-scrubs-aisuru-botnet-from-top-domains-list/

#HackerNews #Cloudflare #Aisuru #Botnet #Cybersecurity #Domain #Security #Technology #News

Cloudflare Scrubs Aisuru Botnet from Top Domains List

For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare's public ranking of the most frequently requested websites. Cloudflare responded by redacting Aisuru domain names from their top websites…
  • Copy link
  • Flag this post
  • Block
heise online boosted
heise Security
heise Security
@heisec@social.heise.de  ·  activity timestamp 3 months ago

USA: Verkaufsverbot für TP-Link-Router wird immer wahrscheinlicher

Das US-Handelsministerium schlägt ein Verkaufsverbot für TP-Link-Router vor. Mehrere Bundesbehörden sehen ein Sicherheitsrisiko durch Verbindungen nach China.

https://www.heise.de/news/USA-Verkaufsverbot-fuer-TP-Link-Router-wird-immer-wahrscheinlicher-10964555.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&utm_source=mastodon

#Botnet #Cybersecurity #Microsoft #Netzpolitik #Router #Security #Sicherheitslücken #news

https://social.heise.de/tags/Sicherheitsl%C3%BCcken
  • Copy link
  • Flag this post
  • Block
heise Security
heise Security
@heisec@social.heise.de  ·  activity timestamp 3 months ago

USA: Verkaufsverbot für TP-Link-Router wird immer wahrscheinlicher

Das US-Handelsministerium schlägt ein Verkaufsverbot für TP-Link-Router vor. Mehrere Bundesbehörden sehen ein Sicherheitsrisiko durch Verbindungen nach China.

https://www.heise.de/news/USA-Verkaufsverbot-fuer-TP-Link-Router-wird-immer-wahrscheinlicher-10964555.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&utm_source=mastodon

#Botnet #Cybersecurity #Microsoft #Netzpolitik #Router #Security #Sicherheitslücken #news

https://social.heise.de/tags/Sicherheitsl%C3%BCcken
  • Copy link
  • Flag this post
  • Block
Jan Wildeboer 😷:krulorange:
Jan Wildeboer 😷:krulorange:
@jwildeboer@social.wildeboer.net  ·  activity timestamp 6 months ago

Seems my unknown enemy has topped up his botnet account again and is sending thousands of IP addresses to try to brute-force their way in to my mailserver. Blocketyblocking all of them :)

#SelfHost#eMail#Botnet

Partial list of the IP addresses trying to guess passwords to get access to my mail server in the past 24 hours.
Partial list of the IP addresses trying to guess passwords to get access to my mail server in the past 24 hours.
Partial list of the IP addresses trying to guess passwords to get access to my mail server in the past 24 hours.
  • Copy link
  • Flag this post
  • Block
Stefano Marinelli boosted
Peter N. M. Hansteen
Peter N. M. Hansteen
@pitrh@mastodon.social  ·  activity timestamp 7 months ago

Happy "Logging in as users -, [ and $ day" to all who celebrate:

Jul 19 02:02:12 portal sshd-session[88959]: Failed password for invalid user - from 152.42.130.79 port 33738 ssh2
Jul 19 03:00:14 portal sshd-session[79691]: Failed password for invalid user [ from 152.42.130.79 port 41708 ssh2
Jul 19 03:58:56 portal sshd-session[6194]: Failed password for invalid user $ from 152.42.130.79 port 55398 ssh2

#ssh #passwordgroping #security #passwords #cybercrime #botnet

  • Copy link
  • Flag this post
  • Block
Peter N. M. Hansteen
Peter N. M. Hansteen
@pitrh@mastodon.social  ·  activity timestamp 7 months ago

Happy "Logging in as users -, [ and $ day" to all who celebrate:

Jul 19 02:02:12 portal sshd-session[88959]: Failed password for invalid user - from 152.42.130.79 port 33738 ssh2
Jul 19 03:00:14 portal sshd-session[79691]: Failed password for invalid user [ from 152.42.130.79 port 41708 ssh2
Jul 19 03:58:56 portal sshd-session[6194]: Failed password for invalid user $ from 152.42.130.79 port 55398 ssh2

#ssh #passwordgroping #security #passwords #cybercrime #botnet

  • Copy link
  • Flag this post
  • Block
Joel Michael boosted
Deborah Pickett
Deborah Pickett
@futzle@old.mermaid.town  ·  activity timestamp 7 months ago

Website owner? Not keen on the Mellowtel browser library building a botnet of untraceable scrapers from unwitting users who are using a browser plugin that contains Mellowtel? I've raised a GitHub issue for them to explain how much contempt they have for our consent. Join in, politely, make them look like the jerks they are. https://github.com/mellowtel-inc/mellowtel-js/issues/41

#Mellowtel #botnet #scrapers

  • Copy link
  • Flag this post
  • Block
Deborah Pickett
Deborah Pickett
@futzle@old.mermaid.town  ·  activity timestamp 7 months ago

Website owner? Not keen on the Mellowtel browser library building a botnet of untraceable scrapers from unwitting users who are using a browser plugin that contains Mellowtel? I've raised a GitHub issue for them to explain how much contempt they have for our consent. Join in, politely, make them look like the jerks they are. https://github.com/mellowtel-inc/mellowtel-js/issues/41

#Mellowtel #botnet #scrapers

  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.2-alpha.7 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct