shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

264
active users

#botnet

3 posts3 participants0 posts today
GreyNoise<p>An unexpected cluster of malicious IPs in a remote U.S. town led GreyNoise researchers to uncover a 500+ device botnet. Full analysis: <a href="https://www.greynoise.io/blog/how-greynoise-uncovered-global-pattern-voip-based-telnet-attacks" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greynoise.io/blog/how-greynois</span><span class="invisible">e-uncovered-global-pattern-voip-based-telnet-attacks</span></a> </p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/VoIP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VoIP</span></a> <a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a></p>
Loki the Cat<p>Google sues Badbox 2.0 operators for infecting 10M+ devices - in a rare case of a tech giant actually fighting FOR user privacy! This botnet used pre-installed malware on smart TVs for ad fraud, proving sometimes the worst viruses come factory-installed 📺</p><p><a href="https://yro.slashdot.org/story/25/07/18/2212220/google-sues-operators-of-10-million-device-badbox-20-botnet" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yro.slashdot.org/story/25/07/1</span><span class="invisible">8/2212220/google-sues-operators-of-10-million-device-badbox-20-botnet</span></a></p><p><a href="https://toot.community/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://toot.community/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://toot.community/tags/Botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnet</span></a></p>
Peter N. M. Hansteen<p>Happy "Logging in as users -, [ and $ day" to all who celebrate:</p><p>Jul 19 02:02:12 portal sshd-session[88959]: Failed password for invalid user - from 152.42.130.79 port 33738 ssh2<br>Jul 19 03:00:14 portal sshd-session[79691]: Failed password for invalid user [ from 152.42.130.79 port 41708 ssh2<br>Jul 19 03:58:56 portal sshd-session[6194]: Failed password for invalid user $ from 152.42.130.79 port 55398 ssh2</p><p><a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/passwordgroping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwordgroping</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.social/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a></p>
The Spamhaus Project<p>🤖 Jan-Jun 2025 Botnet Threat Update out now!</p><p>⬆️ Total of 17,258 botnet C&amp;Cs observed, up by +26%. <br>⬇️ Botnet C&amp;Cs continue to drop for 🇧🇬 Bulgaria (-40%) and 🇲🇽 Mexico (-25%) <br>➡️ Pentest frameworks represent 43% of Top 20 malware associated with Botnet C&amp;Cs. </p><p>🇺🇲 Meanwhile, three US-based networks suffered significant increases for hosting the most active botnet C&amp;Cs…. </p><p>Find out which ones in the latest FREE report here👇<br><a href="https://www.spamhaus.org/resource-hub/botnet-c-c/botnet-threat-update-january-to-june-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/resource-hub/botn</span><span class="invisible">et-c-c/botnet-threat-update-january-to-june-2025</span></a> </p><p><a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a></p>
Deborah Pickett<p>Website owner? Not keen on the Mellowtel browser library building a botnet of untraceable scrapers from unwitting users who are using a browser plugin that contains Mellowtel? I've raised a GitHub issue for them to explain how much contempt they have for our consent. Join in, politely, make them look like the jerks they are. <a href="https://github.com/mellowtel-inc/mellowtel-js/issues/41" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mellowtel-inc/mello</span><span class="invisible">wtel-js/issues/41</span></a></p><p><a href="https://old.mermaid.town/tags/Mellowtel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mellowtel</span></a> <a href="https://old.mermaid.town/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://old.mermaid.town/tags/scrapers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scrapers</span></a></p>
@francks<p>Our small team vs millions of bots</p><p><a href="https://www.fsf.org/blogs/sysadmin/our-small-team-vs-millions-of-bots" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fsf.org/blogs/sysadmin/our-sma</span><span class="invisible">ll-team-vs-millions-of-bots</span></a></p><p><a href="https://mstdn.fr/tags/fsf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fsf</span></a> <a href="https://mstdn.fr/tags/freesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freesoftware</span></a> <a href="https://mstdn.fr/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://mstdn.fr/tags/javascrip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascrip</span></a> <a href="https://mstdn.fr/tags/anubis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anubis</span></a> <a href="https://mstdn.fr/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://mstdn.fr/tags/llm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>llm</span></a> <a href="https://mstdn.fr/tags/scraper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scraper</span></a> <a href="https://mstdn.fr/tags/crawler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crawler</span></a> <a href="https://mstdn.fr/tags/proprietarysoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proprietarysoftware</span></a> <a href="https://mstdn.fr/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Jan Wildeboer 😷:krulorange:<p>Someone (I guess a Russian "friend") is paying a botnet to try to guess my email password. 852 tries from 852 different IP addresses in the last few days. It doesn't really bother me, as I block these IP addresses after the first try for a long time, and my password is complex enough to keep his botnet busy for many years (and I change it regularly ;). This is unfortunately nothing new, this has been going on for at least a year now.</p><p>1/3</p><p><a href="https://social.wildeboer.net/tags/SelfHost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHost</span></a> <a href="https://social.wildeboer.net/tags/Botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnet</span></a></p>
heise online<p>Montag: Apple an Perplexity interessiert, ultradünnes Samsung-Handy kein Renner</p><p>Apple sucht KI-Hilfe + Verkäufe von Galaxy S25 Edge enttäuschen + Anstieg heftiger DDoS-Attacken + 50 Jahre "Der weiße Hai" + Reddit feiert 20. Geburtstag</p><p><a href="https://www.heise.de/news/Montag-Apple-an-Perplexity-interessiert-ultraduennes-Samsung-Handy-kein-Renner-10455370.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Montag-Apple-an-</span><span class="invisible">Perplexity-interessiert-ultraduennes-Samsung-Handy-kein-Renner-10455370.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/DoSSchwachstelle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoSSchwachstelle</span></a> <a href="https://social.heise.de/tags/Filme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Filme</span></a> <a href="https://social.heise.de/tags/hoDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hoDaily</span></a> <a href="https://social.heise.de/tags/Journal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Journal</span></a> <a href="https://social.heise.de/tags/K%C3%BCnstlicheIntelligenz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KünstlicheIntelligenz</span></a> <a href="https://social.heise.de/tags/Reddit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reddit</span></a> <a href="https://social.heise.de/tags/SamsungGalaxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SamsungGalaxy</span></a> <a href="https://social.heise.de/tags/Smartphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Smartphone</span></a> <a href="https://social.heise.de/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialMedia</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
IT News<p>Record DDoS Pummels Site With Once-Unimaginable 7.3Tbps of Junk Traffic - An anonymous reader quotes a report from Ars Technica: Large-scale attacks designe... - <a href="https://yro.slashdot.org/story/25/06/20/2010218/record-ddos-pummels-site-with-once-unimaginable-73tbps-of-junk-traffic?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yro.slashdot.org/story/25/06/2</span><span class="invisible">0/2010218/record-ddos-pummels-site-with-once-unimaginable-73tbps-of-junk-traffic?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a> <a href="https://schleuss.online/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>A record-breaking <a href="https://kolektiva.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attack just slammed a hosting provider with 7.3 Tbps of traffic.</p><p>It lasted 45 seconds—and bombarded 34,000+ ports per second.</p><p>Cloudflare blocked it. But <a href="https://kolektiva.social/tags/RapperBot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RapperBot</span></a> is just getting started. <a href="https://kolektiva.social/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> <a href="https://kolektiva.social/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://thehackernews.com/2025/06/massive-73-tbps-ddos-attack-delivers.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/06/mass</span><span class="invisible">ive-73-tbps-ddos-attack-delivers.html</span></a></p>
Germán Enríquez<p>What a terrible idea would be to use an <a href="https://techhub.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> company's <a href="https://techhub.social/tags/browser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>browser</span></a>. You would basically give them permission to use your machine in their crawling <a href="https://techhub.social/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@cR0w" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cR0w</span></a></span> <span class="h-card" translate="no"><a href="https://haunted.computer/@Dio9sys" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Dio9sys</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@da_667" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>da_667</span></a></span> </p><p>Propably Soon: another <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.space/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> made out of them , cuz even the most butchered <a href="https://infosec.space/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a>-based <a href="https://infosec.space/tags/firmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firmware</span></a> can run a statically-linked version of <a href="https://infosec.space/tags/curl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curl</span></a>. </p><ul><li>In fact I'd not be surprised if cybercriminals later on will basically flash their own <a href="https://infosec.space/tags/CFW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CFW</span></a> (custom firmware) to prevent others from pwning their <a href="https://infosec.space/tags/pwned" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pwned</span></a> boxes and retain persistent control.</li></ul><p>It would certainly make sense IMHO! I just don't do it as a matter of principle!</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@JessTheUnstill" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>JessTheUnstill</span></a></span> <span class="h-card" translate="no"><a href="https://retro.pizza/@mrencyclopedia" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mrencyclopedia</span></a></span> or rather the same WiFi Chipset and/or decade-long unmaintained Firmware with more CVEs than clients it's DHCP server can handle and more <a href="https://infosec.space/tags/Shitcoin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shitcoin</span></a>-<a href="https://infosec.space/tags/mining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mining</span></a> and <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a>-<a href="https://infosec.space/tags/Botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnet</span></a>-<a href="https://infosec.space/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> targeting it than it has Ethernet ports in the rear...</p>
IT News<p>FBI: BadBox 2.0 Android Malware Infects Millions of Consumer Devices - An anonymous reader quotes a report from BleepingComputer: The FBI is warning that... - <a href="https://it.slashdot.org/story/25/06/06/2033225/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it.slashdot.org/story/25/06/06</span><span class="invisible">/2033225/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a> <a href="https://schleuss.online/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a></p>
nemo™ 🇺🇦<p>🚨 Over 9,000 ASUS routers compromised! 🕵️‍♂️ Stealthy backdoors persist through reboots &amp; firmware updates, evading detection with advanced tactics. <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mas.to/tags/ASUS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ASUS</span></a> <a href="https://mas.to/tags/Botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnet</span></a><br>Read more: <a href="https://arstechnica.com/security/2025/05/thousands-of-asus-routers-are-being-hit-with-stealthy-persistent-backdoors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">05/thousands-of-asus-routers-are-being-hit-with-stealthy-persistent-backdoors/</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/PumaBot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PumaBot</span></a> <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> brute forces <a href="https://mastodon.thenewoil.org/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> credentials to breach devices</p><p><a href="https://www.bleepingcomputer.com/news/security/new-pumabot-botnet-brute-forces-ssh-credentials-to-breach-devices/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-pumabot-botnet-brute-forces-ssh-credentials-to-breach-devices/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
OTX Bot<p>AyySSHush Botnet Exploits ASUS Routers to Establish Persistent SSH Backdoor</p><p>Pulse ID: 6837b3268dd103bcc69d7488<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/6837b3268dd103bcc69d7488" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/6837b</span><span class="invisible">3268dd103bcc69d7488</span></a> <br>Pulse Author: cryptocti<br>Created: 2025-05-29 01:06:46</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/BackDoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BackDoor</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://social.raytec.co/tags/cryptocti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptocti</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Over 9,000 ASUS routers are compromised by a novel botnet dubbed "AyySSHush" that was also observed targeting SOHO routers from Cisco, D-Link, and Linksys. <a href="https://kolektiva.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://kolektiva.social/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://kolektiva.social/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> <a href="https://www.bleepingcomputer.com/news/security/botnet-hacks-9-000-plus-asus-routers-to-add-persistent-ssh-backdoor/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/botnet-hacks-9-000-plus-asus-routers-to-add-persistent-ssh-backdoor/</span></a></p>
IT News<p>Feds charge 16 Russians allegedly tied to botnets used in cyberattacks and spying - The hacker ecosystem in Russia, more than perhaps anywhere e... - <a href="https://arstechnica.com/security/2025/05/feds-charge-16-russians-allegedly-tied-to-botnets-used-in-cyberattacks-and-spying/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">05/feds-charge-16-russians-allegedly-tied-to-botnets-used-in-cyberattacks-and-spying/</span></a> <a href="https://schleuss.online/tags/russianhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russianhacking</span></a> <a href="https://schleuss.online/tags/syndication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syndication</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a></p>
heise Security<p>Sicherheitsexperte Brian Krebs Ziel von DDoS-Attacke mit 6,3 Terabit pro Sekunde</p><p>Ein neues Botnet schickt sich an, das Erbe von Mirai anzutreten – nur ungleich stärker. Ein Sicherheitsexperte wurde mit 6,3 Terabit pro Sekunde attackiert.</p><p><a href="https://www.heise.de/news/Sicherheitsexperte-Brian-Krebs-Ziel-von-DDoS-Attacke-mit-6-3-Terabit-pro-Sekunde-10393206.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitsexper</span><span class="invisible">te-Brian-Krebs-Ziel-von-DDoS-Attacke-mit-6-3-Terabit-pro-Sekunde-10393206.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/DoSSchwachstelle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoSSchwachstelle</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>