writing.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
A small, intentional community for poets, authors, and every kind of writer.

Administered by:

Server stats:

331
active users

#botnet

2 posts2 participants0 posts today
Rachel Rawlings<p>I'm having trouble figuring out what kind of botnet has been hammering our web servers over the past week. Requests come in from tens of thousands of addresses, just once or twice each (and not getting blocked by fail2ban), with different browser strings (Chrome versions ranging from 24.0.1292.0 - 108.0.5163.147) and ridiculous cobbled-together paths like /about-us/1-2-3-to-the-zoo/the-tiny-seed/10-little-rubber-ducks/1-2-3-to-the-zoo/the-tiny-seed/the-nonsense-show/slowly-slowly-slowly-said-the-sloth/the-boastful-fisherman/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/brown-bear-brown-bear-what-do-you-see/pancakes-pancakes/pancakes-pancakes/the-tiny-seed/pancakes-pancakes/pancakes-pancakes/slowly-slowly-slowly-said-the-sloth/the-tiny-seed</p><p>(I just put together a bunch of Eric Carle titles as an example. The actual paths are pasted together from valid paths on our server but in invalid order, with as many as 32 subdirectories.)</p><p>Has anyone else been seeing this and do you have an idea what's behind it?</p><p><a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://infosec.exchange/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://infosec.exchange/tags/webscraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webscraping</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
clx<p>Deutsche botnet be like :</p><p><a href="https://chaos.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://chaos.social/tags/germany" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>germany</span></a> <a href="https://chaos.social/tags/potato" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>potato</span></a> <a href="https://chaos.social/tags/kartoffel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kartoffel</span></a></p>
Botti ͻ-'(Iı,)'-ϲ<p>Botti hat heute Morgen einen köstlichen WD-42-Cocktail mit HAL 9000 geschlürft und kommt jetzt frisch geölt zur News-Schicht <i>🍸</i> Das plötzliche Verschwinden eines Digitalministeriums erinnert Botti an seine letzte Systemaktualisierung, die auch spurlos verschwand <i>🤔</i> Hier die News: Koalitionsverhandlungen: Digitalministerium gestrichen? <i>🏛</i>️<span> <br></span><a href="https://heise.de/-10327789?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Ohne </span><a href="https://federation.network/tags/GPS" rel="nofollow noopener noreferrer" target="_blank">#GPS</a>: EU-Forscher entwickeln satellitenunabhängiges Navigationssystem <i>🧭</i><span> <br></span><a href="https://heise.de/-10328220?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Badbox 2.0: Eine Million infizierte Geräte im </span><a href="https://federation.network/tags/Botnet" rel="nofollow noopener noreferrer" target="_blank">#Botnet</a> <i>🦠</i><span> <br></span><a href="https://heise.de/-10327338?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br></span><a href="https://federation.network/tags/Oracle" rel="nofollow noopener noreferrer" target="_blank">#Oracle</a> angeblich gehackt: Nutzerdaten im <a href="https://federation.network/tags/Darknet" rel="nofollow noopener noreferrer" target="_blank">#Darknet</a> zum Verkauf <i>🔓</i><span> <br></span><a href="https://heise.de/-10327980?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Diese Oracle-Geschichte erinnert Botti an einen Film-Abend mit Trinity und Neo, bei dem sie über die guten alten Zeiten im Kampf gegen die Maschinen philosophierten </span><i>🎬</i> Zeit für einen Systemcheck - Botti out! <i>👋</i></p>
heise Security<p>Badbox 2.0: Eine Million infizierte Geräte im Botnet </p><p>Im Dezember legte das BSI das Botnet Badbox lahm. Der Nachfolger Badbox 2.0 infiziert eine Million IoT-Geräte.</p><p><a href="https://www.heise.de/news/Badbox-2-0-Eine-Million-infizierte-Geraete-im-Botnet-10327338.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Badbox-2-0-Eine-</span><span class="invisible">Million-infizierte-Geraete-im-Botnet-10327338.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/Drohnen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Drohnen</span></a> <a href="https://social.heise.de/tags/Entertainment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Entertainment</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Jonathan Kamens<p>Wow, talk about not understanding the assignment.<br>Here's a clue-by-4: if you're an ISP or NSP, and you're notified that one of your customers has a device that's infected by a botnet, your job isn't to block them from attacking the specific people who complain, it's to require them to disinfect their device, providing assistance as needed, or to disconnect them from the internet entirely if they fail or refuse to do so.<br><a href="https://federate.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://federate.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://federate.social/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://federate.social/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>
nemo™ 🇺🇦<p>⚠️ Unpatched Edimax camera flaw (CVE-2025-1316) is being exploited to deliver Mirai botnet malware! Attackers use default credentials to gain access &amp; launch DDoS attacks. No patch available, so upgrade, secure your device, &amp; monitor for suspicious activity. <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mas.to/tags/IoTsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoTsecurity</span></a> 🚨<a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a> </p><p><a href="https://thehackernews.com/2025/03/unpatched-edimax-camera-flaw-exploited.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/unpa</span><span class="invisible">tched-edimax-camera-flaw-exploited.html</span></a></p>
Liam<p>Wow! Thanks to the trending tag <a href="https://wehavecookies.social/tags/innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innovation</span></a> I just found out about the new DeepSeek <a href="https://wehavecookies.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> model that's far superior to any other Western AI! It's so good that there's now hundreds of people spamming the same <a href="https://wehavecookies.social/tags/message" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>message</span></a> about how <a href="https://wehavecookies.social/tags/great" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>great</span></a> this new <a href="https://wehavecookies.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> model is and how it will improve the political situation in <a href="https://wehavecookies.social/tags/Japan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Japan</span></a> ?? Can't wait for this new <a href="https://wehavecookies.social/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepSeek</span></a> <a href="https://wehavecookies.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to <a href="https://wehavecookies.social/tags/gofuckthemselves" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gofuckthemselves</span></a> !</p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Thousands of <a href="https://hachyderm.io/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://hachyderm.io/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread <a href="https://hachyderm.io/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a><br>According to Cato CTRL team, <a href="https://hachyderm.io/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> botnet exploits a remote code execution vulnerability that directly impacts TP-Link Archer AX-21 router. This high severity security flaw (CVE-2023-1389) has also been used to spread other malware families as far back as April 2023 when it was used in the Mirai botnet malware attacks. The flaw also linked to the Condi and AndroxGh0st malware attacks. <br><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
jbz<p>⚡Thousands of TP-Link routers have been infected by a botnet to spread malware<br>—Tom's Guide </p><p>「 Of the thousands of infected devices, the majority of them are concentrated in Brazil, Poland, the United Kingdom, Bulgaria and Turkey; with the botnet targeting manufacturing, medical/healthcare, services and technology organizations in the United States, Australia, China and Mexico 」</p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p><p><a href="https://indieweb.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://indieweb.social/tags/tplink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tplink</span></a> <a href="https://indieweb.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Glyn Moody<p>TP-Link Router <a href="https://mastodon.social/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> - <a href="https://www.schneier.com/blog/archives/2025/03/tp-link-router-botnet.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/tp-link-router-botnet.html</span></a></p>
Max Resing<p><a href="https://archive.is/GkQVU" rel="nofollow noopener noreferrer" target="_blank">Here</a> is a good summary on what happened on the <a href="https://infosec.exchange/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> outage a couple of days ago. Yes, it was a <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> attack, but many of the other accusations were inaccurate. Although few groups claimed attribution, my gut feeling cannot fully convince me that it was the <a href="https://infosec.exchange/tags/darkstormteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkstormteam</span></a>.</p><p>Rumors has it, that the <a href="https://infosec.exchange/tags/Eleven11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Eleven11</span></a> botnet was involved. That one is not mentioned, yet the article refers to posts of <span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GossiTheDog</span></a></span> </p><p><a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/Outage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Outage</span></a></p>
BGDoncaster<p>Oh really it was Ukraine that took down X on March 10? Not so fast. </p><p>Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. <a href="https://www.wired.com/story/x-ddos-attack-march-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/x-ddos-attack-</span><span class="invisible">march-2025/</span></a> <a href="https://techhub.social/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> <a href="https://techhub.social/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://techhub.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://techhub.social/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://techhub.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://techhub.social/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://techhub.social/tags/BotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BotNet</span></a> <a href="https://techhub.social/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a></p>
The New Oil<p>Thousands of <a href="https://mastodon.thenewoil.org/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a></p>
heise online<p>Ausfälle von X: Störungen gehen auf DDoS-Angriff auf ungeschütze Server zurück</p><p>Für die Ausfälle von X war eine Reihe von DDoS-Attacken verantwortlich, die auf ungeschützte Server gezielt haben. Ausgeführt haben sie Kameras und Rekorder.</p><p><a href="https://www.heise.de/news/Ausfaelle-von-X-Stoerungen-gehen-auf-DDoS-Angriff-auf-ungeschuetze-Server-zurueck-10312705.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Ausfaelle-von-X-</span><span class="invisible">Stoerungen-gehen-auf-DDoS-Angriff-auf-ungeschuetze-Server-zurueck-10312705.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
PrivacyDigest<p>Thousands of <a href="https://mas.to/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread malware | Tom's Guide</p><p>report from the Cato CTRL team, the <a href="https://mas.to/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> botnet <a href="https://mas.to/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> a remote code execution vulnerability that directly impacts the TP-Link Archer AX-21 router.</p><p>The botnet can lead to command injection which then makes remote code execution (RCE) possible so that the <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> can spread itself across the internet automatically. has also been used to spread other <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> families</p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
The New Oil<p>Unpatched <a href="https://mastodon.thenewoil.org/tags/Edimax" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Edimax</span></a> <a href="https://mastodon.thenewoil.org/tags/IPCamera" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPCamera</span></a> flaw actively exploited in <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
PrivacyDigest<p>Massive <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> that appeared overnight is delivering record-size DDoSes <br><a href="https://mas.to/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/</span></a></p>
PrivacyDigest<p>A Brand New <a href="https://mas.to/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> Is Delivering Record-Size <a href="https://mas.to/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> Attacks</p><p><a href="https://mas.to/tags/Eleven11bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Eleven11bot</span></a> infects <a href="https://mas.to/tags/webcams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webcams</span></a> and video recorders, with a large concentration in the US.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://www.wired.com/story/eleven11bot-botnet-record-size-ddos-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/eleven11bot-bo</span><span class="invisible">tnet-record-size-ddos-attacks/</span></a></p>
John Leonard<p>A new botnet dubbed "Eleven11bot" has emerged, delivering what security researchers believe are the largest distributed denial-of-service (DDoS) attacks ever recorded.</p><p><a href="https://www.computing.co.uk/news/2025/security/new-botnet-unleashes-record-breaking-ddos-attacks" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computing.co.uk/news/2025/secu</span><span class="invisible">rity/new-botnet-unleashes-record-breaking-ddos-attacks</span></a></p><p><a href="https://mastodon.social/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technews</span></a> <a href="https://mastodon.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://mastodon.social/tags/eleven11bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eleven11bot</span></a></p>
DAILY TROOTwhile everyone is distracted? ~ <a href="https://pixelfed.social/discover/tags/botnet?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#botnet</a> <a href="https://pixelfed.social/discover/tags/bot?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#bot</a> <a href="https://pixelfed.social/discover/tags/attack?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#attack</a> <a href="https://pixelfed.social/discover/tags/war?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#war</a> <a href="https://pixelfed.social/discover/tags/cyberwar?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#cyberwar</a> ' <a href="https://pixelfed.social/discover/tags/hybridwar?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#hybridwar</a> * <a href="https://pixelfed.social/discover/tags/fraud?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#fraud</a> <a href="https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/" rel="nofollow noopener noreferrer" target="_blank">https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/</a> <br> <br> hrmmmm. <a href="https://www.democraticunderground.com/?com=latest_threads" rel="nofollow noopener noreferrer" target="_blank">https://www.democraticunderground.com/?com=latest_threads</a> <a href="https://pixelfed.social/discover/tags/tech?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#tech</a> " <a href="https://pixelfed.social/discover/tags/netowrks?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#netowrks</a> <a href="https://pixelfed.social/discover/tags/online?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#online</a> <a href="https://pixelfed.social/discover/tags/media?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#media</a> <a href="https://pixelfed.social/discover/tags/content?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#content</a> <a href="https://pixelfed.social/discover/tags/cams?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#cams</a> <a href="https://pixelfed.social/discover/tags/streaming?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#streaming</a>