Netcrook

Botnets

274 article(s)

DinDoor Malware: How Hackers Weaponize Deno and MSI Installers to Evade Detection

🗓 22 Apr 2026 · 👤 TRUSTBREAKER · 🌍 Middle-East

DinDoor malware is breaking new ground by exploiting trusted developer tools like Deno and deceptive MSI installers. Linked to the Iranian Seedworm group, this backdoor uses advanced evasion and a multi-tenant command infrastructure, challenging defenders to rethink what security really means.

Ukraine Cracks Massive Bot Farm Supplying Russian Spies with Fake Telegram Accounts

🗓 21 Apr 2026 · 👤 KERNELWATCHER · 🌍 Europe

Ukrainian law enforcement has busted a major bot farm in Zhytomyr, blocking nearly 20,000 fake Telegram accounts allegedly sold to Russian intelligence for disinformation and cyberattacks. Inside the operation fueling Russia's shadow war online.

Stealth in Pixels: PureRAT’s Fileless Malware Hides in PNG Images

🗓 21 Apr 2026 · 👤 TRUSTBREAKER

PureRAT’s latest campaign hides dangerous malware inside innocent-looking PNG files, using fileless techniques and advanced evasion to compromise Windows systems without leaving a trace.

Hackers Hide Fileless Malware in PNG Images: Inside the PureRAT Steganography Attack

🗓 21 Apr 2026 · 👤 KERNELWATCHER

A sophisticated PureRAT campaign is using innocent-looking PNG images to deliver fileless malware, bypassing traditional defenses through steganography and advanced Windows exploitation.

Gh0st RAT and CloverPlus: Inside the Double-Threat Malware Campaign

🗓 20 Apr 2026 · 👤 TRUSTBREAKER

A stealthy cyber campaign is infecting Windows systems with both Gh0st RAT and CloverPlus adware, giving attackers remote access and ad fraud revenue. Here’s how the attack works—and how defenders can spot it.

Bluesky Under Siege: The DDoS Attack That Tested a Decentralized Social Network

🗓 20 Apr 2026 · 👤 KERNELWATCHER · 🌍 Middle-East

A sophisticated DDoS attack disrupted Bluesky, the rising decentralized social network, with an Iran-linked group claiming responsibility. Although user data remained safe, the assault exposes the cyber risks facing next-generation platforms.

Bluesky Hit by Major DDoS Attack: What Happened and Who’s Behind It?

🗓 20 Apr 2026 · 👤 TRUSTBREAKER · 🌍 Middle-East

Bluesky, the decentralized Twitter alternative, was knocked offline by a major DDoS attack claimed by a pro-Iran hacktivist group. Here’s how the attack unfolded, what it means for users, and why even decentralized platforms aren’t immune to cyber threats.

Microsoft-Signed Malware: FUD Crypt Service Delivers Stealth Attacks

🗓 20 Apr 2026 · 👤 KERNELWATCHER · 🌍 North America

A new cybercrime service called FUD Crypt is arming hackers with Microsoft-signed, fully undetectable malware. By abusing Azure Trusted Signing, attackers can deploy persistent backdoors that blend in with legitimate system processes—no coding required.

TBK DVR Flaw Fuels Nexcorium Botnet: Inside the DDoS Cyber Offensive

🗓 20 Apr 2026 · 👤 TRUSTBREAKER

Hackers are exploiting a major flaw in TBK DVRs to unleash Nexcorium, a new Mirai-based botnet capable of large-scale DDoS attacks. Discover how the attack works, what makes Nexcorium dangerous, and why IoT security is more important than ever.

Nexcorium Botnet: How Hackers Exploit TBK DVRs with CVE-2024-3721

🗓 20 Apr 2026 · 👤 KERNELWATCHER

Hackers are exploiting a critical flaw in TBK DVRs to deploy Nexcorium, a new Mirai botnet variant. This investigation reveals the infection chain, botnet operations, and urgent defense measures for vulnerable IoT devices.

« Prev 1   2   3   4   5   Next »