Results for botnet

Threat Research

Quick Analysis of New Method for Spreading TrickBot

Recently, FortiGuard Labs captured a suspicious email. After an analysis, we discovered that it was spreading the malware TrickBot. Read to learn more.

By Xiaopeng ZhangApril 29, 2019

Industry Trends

As the Holiday Season Draws Near, Mobile Malware Attacks Are Prevalent

Fortinet's quarterly Global Threat Landscape Report reveals threats are increasing and evolving to become more sophisticated. Unique threat variants and families are on the rise, while botnet infections continue to infect organizations.

By FortiGuard SE TeamNovember 14, 2018

Threat Research

DDoS-for-Hire Service Powered by Bushido Botnet

The FortiGuard Labs team recently discovered a new platform offering DDoS-for-hire service called “0x-booter.” First appearing on October 17, 2018, 0x-booter is available to anyone who signs up on the website. As shown in the following figures, this service comes with an explicitly defined user interface which enables practically anyone to learn and use the service.

By Rommel Joven and Evgeny AnaninOctober 26, 2018

Industry Trends

Could 5G Mutate the Threat Landscape?

IoT and 5G are important technological achievements that are changing the world. However, this optimism needs to be tempered with clear thinking and planning if we want to keep up with the consequent evolution of the threat landscape happening at the same time.

By Steve MulhearnJune 07, 2018

Industry Trends

New Threats, Old Threats - A Deeper Look

From cryptojacking to botnets to malware, cybercriminals keep evolving their attack methods to increase their success rates.

By Derek MankyJune 06, 2018

Threat Research

Defending Against the New VPNFilter Botnet

A newly reported botnet named VPNFilter targets SCADA/ICS environments by monitoring MODBUS SCADA protocols and exfiltrating website credentials.

By FortiGuard SE TeamMay 23, 2018

Threat Research

Yet Another Crypto Mining Botnet?

In February 2018, several Russian nuclear scientists were arrested for allegedly mining cryptocurrencies using computing resources located at a Russian nuclear warhead facility. Globally, cryptominers are rapidly increasing and spreading for an obvious reason: it’s lucrative.

By David MaciejakMay 03, 2018

Threat Research

Searching for the Reuse of Mirai Code: Hide ‘N Seek Bot

At FortiGuard Labs we were interested in searching out other malware that leverages Mirai code modules. Interestingly, one of the families that showed up in our search was the Hide ‘N Seek (HNS) bot, which was discovered in January of 2018. HNS is a complex botnet that uses P2P to communicate with peers/other infected devices to receive commands. In this article, I will discuss how the Mirai bot code was used in this HNS bot.

By Jasper ManuelApril 16, 2018

Industry Trends

Nine Top Priority Cybersecurity Threats Active in the Education Sector Today – and Why Everyone Should Care

Educational institution networks continue to be a favorite playground for cybercriminals. Because of the age and interests of the majority of educational users, these networks tend to incorporate cutting edge technologies and strategies.

By Anthony GiandomenicoJanuary 31, 2018

Threat Research

IoT Botnet: More Targets in Okiru's Cross-hairs

The first Okiru sample appeared around October 2017 ,and FortiGuard Labs created a write up of its development last December, which included worm capabilities and the embedding of two different exploits. As a follow up, we will now share our findings on the latest Okiru variant that targets ARC processors.

By Rommel Joven & David MaciejakJanuary 25, 2018