Security News
![Malware botnet bricked 600,000 routers in mysterious 2023 attack](/static/build/img/news/malware-botnet-bricked-600000-routers-in-mysterious-2023-attack-small.jpg)
A malware botnet named 'Pumpkin Eclipse' performed a mysterious destructive event in 2023 that destroyed 600,000 office/home office internet routers offline, disrupting customers' internet access. The incident had a focused impact, affecting a single internet service provider and three models of routers used by the firm: the ActionTec T3200s, ActionTec T3260s, and Sagemcom F5380.
![Malware botnet bricked 600,000 routers in mysterious 2023 event](/static/build/img/news/malware-botnet-bricked-600000-routers-in-mysterious-2023-event-small.jpg)
A malware botnet named 'Pumpkin Eclipse' performed a mysterious destructive event in 2023 that destroyed 600,000 office/home office internet routers offline, disrupting customers' internet access. The incident had a focused impact, affecting a single internet service provider and three models of routers used by the firm: the ActionTec T3200s, ActionTec T3260s, and Sagemcom F5380.
![U.S. Dismantles World's Largest 911 S5 Botnet, with 19 Million Infected Devices](/static/build/img/news/u-s-dismantles-world-s-largest-911-s5-botnet-with-19-million-infected-devices-small.jpg)
The U.S. Department of Justice (DoJ) on Wednesday said it dismantled what it described as "likely the world's largest botnet ever," which consisted of an army of 19 million infected devices that...
![Chinese national cuffed on charges of running 'likely the world's largest botnet ever'](/static/build/img/news/chinese-national-cuffed-on-charges-of-running-likely-the-world-s-largest-botnet-ever-small.jpg)
Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.
![US dismantles 911 S5 botnet used for cyberattacks, arrests admin](/static/build/img/news/us-dismantles-911-s5-botnet-used-for-cyberattacks-arrests-admin-small.jpg)
The U.S. Justice Department and international partners dismantled the 911 S5 proxy botnet and arrested 35-year-old Chinese national YunHe Wang, its administrator. The VPN apps that added compromised devices to the 911 S5 residential proxy service include MaskVPN, DewVPN, PaladinVPN, ProxyGate, ShieldVPN, and ShineVPN. Between 2014 and July 2022, they created a network of millions of residential Windows computers worldwide linked to more than 19 million unique IP addresses, including 613,841 IP addresses in the United States.
![US govt sanctions cybercrime gang behind massive 911 S5 botnet](/static/build/img/news/us-govt-sanctions-cybercrime-gang-behind-massive-911-s5-botnet-1-small.jpg)
The U.S. Treasury Department has sanctioned a cybercrime network comprising three Chinese nationals and three Thailand-based companies linked to a massive botnet controlling a residential proxy service known as "911 S5.". Researchers at the Canadian University of Sherbrooke revealed almost two years ago, in June 2022, that this illegitimate residential proxy service lured potential victims by offering free VPN services to install malware designed to add their IP addresses to the 911 S5 botnet.
![US govt sanctions cybercrime gang behind massive 911 S5 botnet](/static/build/img/news/us-govt-sanctions-cybercrime-gang-behind-massive-911-s5-botnet-small.jpg)
The U.S. Treasury Department has sanctioned a cybercrime network comprising three Chinese nationals and three Thailand-based companies linked to a massive botnet controlling a residential proxy service known as "911 S5.". Researchers at the Canadian University of Sherbrooke revealed almost two years ago, in June 2022, that this illegitimate residential proxy service lured potential victims by offering free VPN services to install malware designed to add their IP addresses to the 911 S5 botnet.
![Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique](/static/build/img/news/researchers-warn-of-catddos-botnet-and-dnsbomb-ddos-attack-technique-small.jpg)
The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the past three months to infiltrate vulnerable devices and co-opt them into...
![Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking](/static/build/img/news/kinsing-hacker-group-exploits-more-flaws-to-expand-botnet-for-cryptojacking-small.jpg)
The cryptojacking group known as Kinsing has demonstrated its ability to continuously evolve and adapt, proving to be a persistent threat by swiftly integrating newly disclosed vulnerabilities to...
![Ebury botnet compromises 400,000+ Linux servers](/static/build/img/news/ebury-botnet-compromises-400000-linux-servers-small.jpg)
In many cases, Ebury operators could gain full access to large servers of ISPs and well-known hosting providers. "We have documented cases where the infrastructure of hosting providers was compromised by Ebury. In these cases, we have seen Ebury being deployed on servers rented out by those providers, with no warning to the lessees. This resulted in cases where the Ebury actors were able to compromise thousands of servers at once," says Marc-Etienne M. Léveillé, the ESET researcher who investigated Ebury for more than a decade.