BTC $57054.0562
ETH $3243.0497
BNB $394.9600
SOL $108.4177
XRP $0.5865
stETH $3239.3493
ADA $0.6239
AVAX $39.2702
DOGE $0.0977
TRX $0.1428
wstETH $3750.7519
DOT $8.3691
LINK $19.0300
WETH $3348.6813
MATIC $1.0282
UNI $10.8579
WBTC $56903.9273
IMX $3.3452
ICP $13.0217
BCH $292.5040
LTC $74.0124
CAKE $3.1570
ETC $28.0992
LEO $4.3640
FIL $7.6578
KAS $0.1689
RNDR $7.2011
DAI $1.0000
ATOM $11.2097
HBAR $0.1082
INJ $40.1071
VET $0.0489
TON $2.1280
OKB $51.4855
FDUSD $0.9985
LDO $3.4670
STX $2.9465
XMR $135.8398
XLM $0.1230
ARB $1.8948
NEAR $3.9608
TIA $17.0031
WEMIX $2.3756
GRT $0.2795
ENS $22.1963
MKR $2154.9330
APEX $2.3329
BTC $57054.0562
ETH $3243.0497
BNB $394.9600
SOL $108.4177
XRP $0.5865
stETH $3239.3493
ADA $0.6239
AVAX $39.2702
DOGE $0.0977
TRX $0.1428
wstETH $3750.7519
DOT $8.3691
LINK $19.0300
WETH $3348.6813
MATIC $1.0282
UNI $10.8579
WBTC $56903.9273
IMX $3.3452
ICP $13.0217
BCH $292.5040
LTC $74.0124
CAKE $3.1570
ETC $28.0992
LEO $4.3640
FIL $7.6578
KAS $0.1689
RNDR $7.2011
DAI $1.0000
ATOM $11.2097
HBAR $0.1082
INJ $40.1071
VET $0.0489
TON $2.1280
OKB $51.4855
FDUSD $0.9985
LDO $3.4670
STX $2.9465
XMR $135.8398
XLM $0.1230
ARB $1.8948
NEAR $3.9608
TIA $17.0031
WEMIX $2.3756
GRT $0.2795
ENS $22.1963
MKR $2154.9330
APEX $2.3329
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Botnet MyloBot is rapidly spreading around the world

    More than 50,000 computers are infected with malware every day.

    A sophisticated botnet network known as MyloBot has compromised thousands of systems, most of which are located in India, the US, Indonesia and Iran. According to BitSight, there are currently more than 50,000 unique infected systems every day. When, for the whole of 2020, MyloBot hit only 250,000 hosts.

    MyloBot was first discovered in 2017 and documented by Deep Instinct in mid-2018. In November of the same year, experts from Lumen Black Lotus Labs described the botnet as follows: “What makes MyloBot dangerous is its ability to download and execute any payload after infecting a host. This means that at any time it can download any other type of malware the attacker desires.”

    Last year, malware was seen sending emails from jailbroken devices with malicious ransomware attachments.

    MyloBot is known to use a multi-step sequence to unpack and launch a malicious bot. It is noteworthy that for two weeks after the launch, the malware does not take exactly any action. It contacts the C2 server only after this time has elapsed in order to bypass detection by antivirus systems.

    The main function of the botnet is to establish a connection with the prescribed C2 server and wait for further instructions from it. “When Mylobot receives instructions from the C2 server, it turns the infected computer into a proxy. An infected machine can handle multiple connections and relay traffic,” BitSight said.

    When analyzing the infrastructure of MyloBot, experts found connections to the BHProxies residential proxy service, which is used by the compromised machines.

    Researchers from BitSight said that MyloBot, which has changed a lot since its inception, still has development potential. Over time, the botnet is likely to get even more features and various measures from detection, and will also grow the base of infected hosts even more rapidly. All this makes MyloBot one of the most dangerous botnets in the world.

    Author DeepWeb
    16 packages with cryptominers found in the NPM repository
    VMware fixes critical vulnerability in its Carbon Black App Control product

    Comments 0

    Add comment