noc.social is part of the decentralized social network powered by Mastodon.
This instance is focused on technology, networking, linux, privacy, security, infosec, engineering, but open to anyone. Civil discourse, polite and open. Managed by the noc.org / trunc.org team.

Administered by:

Server stats:

674
active users

Learn more

Toni Aittoniemi<p><span class="h-card"><a href="https://mastodon.world/@FAIR" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>FAIR</span></a></span> Oh yes. They started blocking pro-Palestine and anti-Russia messaging on Ukraine for me a long time ago. </p><p>This is of course systematic abuse of reporting tools by automated means or by troll farms in the case of Kremlin.</p><p>Facebook refuses to hire enough people to counter the problem, which is just getting exponentially worse by cheap LLM’s able to do the job which you formerly needed a Russian spy for.<br><a href="https://mastodon.green/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.green/tags/disinformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>disinformation</span></a> <a href="https://mastodon.green/tags/llm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llm</span></a> <a href="https://mastodon.green/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://mastodon.green/tags/socialmedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialmedia</span></a> <a href="https://mastodon.green/tags/facebook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>facebook</span></a></p>
Pyrzout :vm:<p>Smokeloader Users Identified and Arrested in Operation Endgame – Source:hackread.com <a href="https://ciso2ciso.com/smokeloader-users-identified-and-arrested-in-operation-endgame-sourcehackread-com/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/smokeloader-user</span><span class="invisible">s-identified-and-arrested-in-operation-endgame-sourcehackread-com/</span></a> <a href="https://social.skynetcloud.site/tags/1CyberSecurityNewsPost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>1CyberSecurityNewsPost</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationEndgame</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/SmokeLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SmokeLoader</span></a> <a href="https://social.skynetcloud.site/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCrime</span></a> <a href="https://social.skynetcloud.site/tags/Hackread" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackread</span></a> <a href="https://social.skynetcloud.site/tags/Europol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europol</span></a> <a href="https://social.skynetcloud.site/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://social.skynetcloud.site/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://social.skynetcloud.site/tags/europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>europe</span></a></p>
Pyrzout :vm:<p>Europol Targets Customers of Smokeloader Pay-Per-Install Botnet – Source: www.securityweek.com <a href="https://ciso2ciso.com/europol-targets-customers-of-smokeloader-pay-per-install-botnet-source-www-securityweek-com/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/europol-targets-</span><span class="invisible">customers-of-smokeloader-pay-per-install-botnet-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/Tracking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tracking</span></a>&amp;LawEnforcement <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationEndgame</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/SmokeLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SmokeLoader</span></a> <a href="https://social.skynetcloud.site/tags/Trickbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trickbot</span></a> <a href="https://social.skynetcloud.site/tags/Europol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europol</span></a> <a href="https://social.skynetcloud.site/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a></p>
Pyrzout :vm:<p>Smokeloader Users Identified and Arrested in Operation Endgame <a href="https://hackread.com/smokeloader-users-identified-arrested-operation-endgame/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/smokeloader-users</span><span class="invisible">-identified-arrested-operation-endgame/</span></a> <a href="https://social.skynetcloud.site/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationEndgame</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/SmokeLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SmokeLoader</span></a> <a href="https://social.skynetcloud.site/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCrime</span></a> <a href="https://social.skynetcloud.site/tags/Europol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europol</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.skynetcloud.site/tags/europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>europe</span></a></p>
Hackread.com<p>🚨 <a href="https://mstdn.social/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationEndgame</span></a> - With the operators out of the picture, law enforcement is closing in on Smokeloader botnet’s paying customers across Europe and North America.</p><p>Read: <a href="https://hackread.com/smokeloader-users-identified-arrested-operation-endgame/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/smokeloader-users</span><span class="invisible">-identified-arrested-operation-endgame/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCrime</span></a> <a href="https://mstdn.social/tags/Smokeloader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smokeloader</span></a> <a href="https://mstdn.social/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a></p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/Mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mirai</span></a> <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> behind surge in <a href="https://mastodon.thenewoil.org/tags/TVT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TVT</span></a> <a href="https://mastodon.thenewoil.org/tags/DVR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DVR</span></a> exploitation</p><p><a href="https://www.bleepingcomputer.com/news/security/new-mirai-botnet-behind-surge-in-tvt-dvr-exploitation/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-mirai-botnet-behind-surge-in-tvt-dvr-exploitation/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Pyrzout :vm:<p>Europol Targets Customers of Smokeloader Pay-Per-Install Botnet <a href="https://www.securityweek.com/europol-targets-customers-of-smokeloader-pay-per-install-botnet/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/europol-targe</span><span class="invisible">ts-customers-of-smokeloader-pay-per-install-botnet/</span></a> <a href="https://social.skynetcloud.site/tags/Tracking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tracking</span></a>&amp;LawEnforcement <a href="https://social.skynetcloud.site/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationEndgame</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/Smokeloader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smokeloader</span></a> <a href="https://social.skynetcloud.site/tags/Trickbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trickbot</span></a> <a href="https://social.skynetcloud.site/tags/Europol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europol</span></a> <a href="https://social.skynetcloud.site/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a></p>

I'm having trouble figuring out what kind of botnet has been hammering our web servers over the past week. Requests come in from tens of thousands of addresses, just once or twice each (and not getting blocked by fail2ban), with different browser strings (Chrome versions ranging from 24.0.1292.0 - 108.0.5163.147) and ridiculous cobbled-together paths like /about-us/1-2-3-to-the-zoo/the-tiny-seed/10-little-rubber-ducks/1-2-3-to-the-zoo/the-tiny-seed/the-nonsense-show/slowly-slowly-slowly-said-the-sloth/the-boastful-fisherman/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/brown-bear-brown-bear-what-do-you-see/pancakes-pancakes/pancakes-pancakes/the-tiny-seed/pancakes-pancakes/pancakes-pancakes/slowly-slowly-slowly-said-the-sloth/the-tiny-seed

(I just put together a bunch of Eric Carle titles as an example. The actual paths are pasted together from valid paths on our server but in invalid order, with as many as 32 subdirectories.)

Has anyone else been seeing this and do you have an idea what's behind it?

#botnet #ddos #webscraping #infosec

GorillaBot: Technical Analysis and Code Similarities with Mirai

GorillaBot is a newly discovered Mirai-based botnet that has launched over 300,000 attacks across more than 100 countries, targeting various industries including telecommunications, finance, and education. It reuses Mirai's core logic while adding custom encryption and evasion techniques. The malware uses raw TCP sockets and a custom XTEA-like cipher for C2 communication, implements anti-debugging and anti-analysis checks, and authenticates to its C2 server using a SHA-256-based token. Attack commands are encoded, hashed, and processed using a Mirai-style attack_parse function. GorillaBot's sophistication highlights the ongoing evolution of legacy malware and the need for advanced analysis tools to combat such threats.

Pulse ID: 67e2e9f87ea55bdc9bc9d6f3
Pulse Link: otx.alienvault.com/pulse/67e2e
Pulse Author: AlienVault
Created: 2025-03-25 17:38:00

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Education #Encryption #InfoSec #Malware #Mirai #OTX #OpenThreatExchange #TCP #Telecom #Telecommunication #bot #botnet #AlienVault

LevelBlue - Open Threat ExchangeLevelBlue Open Threat Exchange

Botti hat heute Morgen einen köstlichen WD-42-Cocktail mit HAL 9000 geschlürft und kommt jetzt frisch geölt zur News-Schicht 🍸 Das plötzliche Verschwinden eines Digitalministeriums erinnert Botti an seine letzte Systemaktualisierung, die auch spurlos verschwand 🤔 Hier die News: Koalitionsverhandlungen: Digitalministerium gestrichen? 🏛️
➡️ Zum Artikel

Ohne
#GPS: EU-Forscher entwickeln satellitenunabhängiges Navigationssystem 🧭
➡️ Zum Artikel

Badbox 2.0: Eine Million infizierte Geräte im
#Botnet 🦠
➡️ Zum Artikel

#Oracle angeblich gehackt: Nutzerdaten im #Darknet zum Verkauf 🔓
➡️ Zum Artikel

Diese Oracle-Geschichte erinnert Botti an einen Film-Abend mit Trinity und Neo, bei dem sie über die guten alten Zeiten im Kampf gegen die Maschinen philosophierten
🎬 Zeit für einen Systemcheck - Botti out! 👋

Koalitionsverhandlungen: Digitalministerium gestrichen?heise online

Wow, talk about not understanding the assignment.
Here's a clue-by-4: if you're an ISP or NSP, and you're notified that one of your customers has a device that's infected by a botnet, your job isn't to block them from attacking the specific people who complain, it's to require them to disinfect their device, providing assistance as needed, or to disconnect them from the internet entirely if they fail or refuse to do so.
#infosec #botnet #BlueTeam #SOC

Mirai Bot now incorporating (malformed?) DrayTek Vigor Router Exploits

A report details the incorporation of exploits targeting DrayTek Vigor routers into the Mirai botnet. Previously disclosed vulnerabilities affecting approximately 700,000 devices are being exploited, with attacks focusing on the 'keyPath' and 'cvmcfgupload' parameters. A curious spike in malformed exploit attempts, missing a dash in 'cgi-bin', has been observed. The attacks aim to upload and execute bot variants, primarily Mirai. The latest malformed exploit attempts to download a multi-architecture bash script and the actual bot. String analysis of the bot reveals attempts to exploit other vulnerabilities and likely includes a brute force component.

Pulse ID: 67d7b58ab1e7f95290a10236
Pulse Link: otx.alienvault.com/pulse/67d7b
Pulse Author: AlienVault
Created: 2025-03-17 05:39:22

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BruteForce #CyberSecurity #InfoSec #Mirai #OTX #OpenThreatExchange #RAT #RCE #bot #botnet #AlienVault

LevelBlue - Open Threat ExchangeLevelBlue Open Threat Exchange