Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: botnet

GoBruteforcer: Golang-Based Botnet Actively Harvests Web ServersMalware conceptual image, covering variants such as GoBruter
31,183
people reacted

GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers

  • By Siddharth Sharma, Yang Ji, Anmol Maurya and Dongrui Zeng
  • March 10, 2023 at 6:00 AM

14

7 min. read

Mirai Variant V3G4 Targets IoT DevicesA pictorial representation of the Mirai Variant V3G4
48,802
people reacted

Mirai Variant V3G4 Targets IoT Devices

  • By Chao Lei, Zhibin Zhang, Cecilia Hu and Aveek Das
  • February 15, 2023 at 6:00 AM

13

9 min. read

Trending

  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Threat Brief: 3CXDesktopApp Supply Chain Attack by Robert Falcone
  • Threat Brief - CVE-2023-23397 - Microsoft Outlook Privilege Escalation by Unit 42
Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain ThreatsA pictorial representation of network attack trends such as CVE-2021-35394 featuring a stylized bug on IoT-related products. The Palo Alto Networks and Unit 42 logos are included.
61,606
people reacted

Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats

  • By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi
  • January 24, 2023 at 6:00 AM

36

8 min. read

New Mirai Variant Targets WebSVN Command Injection Vulnerability (CVE-2021-32305)A conceptual image representing a vulnerability, such as CVE-2021-32305, discussed in this post.
40,922
people reacted

New Mirai Variant Targets WebSVN Command Injection Vulnerability (CVE-2021-32305)

  • By Brock Mammen and Haozhe Zhang
  • August 30, 2021 at 6:00 AM

32

5 min. read

Network Attack Trends: Internet of Threats (November 2020-January 2021)
37,159
people reacted

Network Attack Trends: Internet of Threats (November 2020-January 2021)

  • By Lei Xu, Yue Guan and Vaibhav Singhal
  • April 12, 2021 at 10:37 AM

30

8 min. read

Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE VulnerabilityConceptual image representing Satori, a Mirai botnet variant being spread by attackers exploiting CVE-2020-9020
30,259
people reacted

Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability

  • By Haozhe Zhang, Vaibhav Singhal, Zhibin Zhang and Jun Du
  • March 17, 2021 at 3:35 PM

26

4 min. read

Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement TakedownsCybercriminals, conceptualized by this image of a man illicitly opening a door into a computer, use techniques such as fast flux, described here, to evade detection and law enforcement takedowns.
52,131
people reacted

Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • March 2, 2021 at 6:00 AM

55

13 min. read

Case Study: Emotet Thread Hijacking, an Email Attack TechniqueThis illustration represents the concept of malicious email, such as those involved in Emotet thread hijacking.
72,113
people reacted

Case Study: Emotet Thread Hijacking, an Email Attack Technique

  • By Brad Duncan
  • September 23, 2020 at 6:00 AM

27

5 min. read

3 Vulnerabilities Found on AvertX IP CamerasThis conceptual image illustrates the concept of a cyber criminal compromising AvertX IP cameras by gaining physical access.
34,974
people reacted

3 Vulnerabilities Found on AvertX IP Cameras

  • By Asher Davila
  • July 17, 2020 at 9:00 AM

43

6 min. read

Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding
35,903
people reacted

Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding

  • By Asher Davila and Yang Ji
  • May 18, 2020 at 9:10 AM

62

6 min. read

Studying How Cybercriminals Prey on the COVID-19 Pandemic
53,939
people reacted

Studying How Cybercriminals Prey on the COVID-19 Pandemic

  • By Janos Szurdi, Zhanhao Chen, Oleksii Starov, Adrian McCabe and Ruian Duan
  • April 22, 2020 at 6:00 AM

46

19 min. read

Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices
67,570
people reacted

Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices

  • By Cong Zheng, Yang Ji and Asher Davila
  • January 21, 2020 at 6:00 AM

59

6 min. read

Home & Small Office Wireless Routers Exploited to Attack Gaming Servers
49,593
people reacted

Home & Small Office Wireless Routers Exploited to Attack Gaming Servers

  • By Asher Davila
  • October 31, 2019 at 6:00 AM

49

9 min. read

Muhstik Botnet Exploits the Latest WebLogic Vulnerability for Cryptomining and DDoS Attacks
47,477
people reacted

Muhstik Botnet Exploits the Latest WebLogic Vulnerability for Cryptomining and DDoS Attacks

  • By Cong Zheng and Yanhui Jia
  • April 30, 2019 at 2:15 PM

13

2 min. read

Mirai Compiled for New Processors Surfaces in the Wild

  • By Ruchna Nigam
  • April 8, 2019 at 6:00 AM

4

4 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.