Netcrook

Botnets

260 article(s)

Gh0st RAT and CloverPlus: Inside the Double-Threat Malware Campaign

🗓 20 Apr 2026 · 👤 TRUSTBREAKER

A stealthy cyber campaign is infecting Windows systems with both Gh0st RAT and CloverPlus adware, giving attackers remote access and ad fraud revenue. Here’s how the attack works—and how defenders can spot it.

Bluesky Under Siege: The DDoS Attack That Tested a Decentralized Social Network

🗓 20 Apr 2026 · 👤 KERNELWATCHER · 🌍 Middle-East

A sophisticated DDoS attack disrupted Bluesky, the rising decentralized social network, with an Iran-linked group claiming responsibility. Although user data remained safe, the assault exposes the cyber risks facing next-generation platforms.

Bluesky Hit by Major DDoS Attack: What Happened and Who’s Behind It?

🗓 20 Apr 2026 · 👤 TRUSTBREAKER · 🌍 Middle-East

Bluesky, the decentralized Twitter alternative, was knocked offline by a major DDoS attack claimed by a pro-Iran hacktivist group. Here’s how the attack unfolded, what it means for users, and why even decentralized platforms aren’t immune to cyber threats.

Microsoft-Signed Malware: FUD Crypt Service Delivers Stealth Attacks

🗓 20 Apr 2026 · 👤 KERNELWATCHER · 🌍 North America

A new cybercrime service called FUD Crypt is arming hackers with Microsoft-signed, fully undetectable malware. By abusing Azure Trusted Signing, attackers can deploy persistent backdoors that blend in with legitimate system processes—no coding required.

TBK DVR Flaw Fuels Nexcorium Botnet: Inside the DDoS Cyber Offensive

🗓 20 Apr 2026 · 👤 TRUSTBREAKER

Hackers are exploiting a major flaw in TBK DVRs to unleash Nexcorium, a new Mirai-based botnet capable of large-scale DDoS attacks. Discover how the attack works, what makes Nexcorium dangerous, and why IoT security is more important than ever.

Nexcorium Botnet: How Hackers Exploit TBK DVRs with CVE-2024-3721

🗓 20 Apr 2026 · 👤 KERNELWATCHER

Hackers are exploiting a critical flaw in TBK DVRs to deploy Nexcorium, a new Mirai botnet variant. This investigation reveals the infection chain, botnet operations, and urgent defense measures for vulnerable IoT devices.

Signed, Sealed, Subverted: Cybercriminals Hijack Microsoft Signing for Stealth Malware

🗓 20 Apr 2026 · 👤 TRUSTBREAKER · 🌍 North America

FUD Crypt has weaponized Microsoft’s trusted signing to deliver invisible, command-enabled malware to paying subscribers. This exposé breaks down the platform’s evasion tactics and what it means for cybersecurity.

Botnet Busted: Why Hackers Keep Failing to Hijack Obsolete TP-Link Routers

🗓 20 Apr 2026 · 👤 KERNELWATCHER

For a year, cybercriminals have tried—and failed—to exploit a critical flaw in discontinued TP-Link routers. Investigate why these attacks keep missing the mark and what it reveals about IoT security risks.

Criminal Clicks: 75,000 DDoS-for-Hire Users Exposed in Global Police Operation

🗓 18 Apr 2026 · 👤 TRUSTBREAKER

Operation PowerOFF exposes over 75,000 users of DDoS-for-hire services, marking a turning point as law enforcement targets not just operators but buyers. The crackdown includes domain seizures, arrests, and direct warnings, aiming to disrupt the booming cybercrime market.

Nexcorium Mirai Variant Exploits TBK DVRs in Aggressive IoT Botnet Campaign

🗓 18 Apr 2026 · 👤 KERNELWATCHER · 🌍 Asia

A newly discovered Mirai variant, Nexcorium, exploits a critical DVR vulnerability to conscript thousands of IoT devices into a DDoS-ready botnet. The Nexus Team’s campaign highlights urgent risks for unpatched smart hardware.

1   2   3   4   5   Next »