Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Hacker operated a massive IoT botnet just to download Anime videos for 8 years
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Hacker operated a massive IoT botnet just to download Anime videos for 8 years

FAT32FAT32 Administrator, Deal Compiler Extraordinaire

Comments

  • LeviLevi Member

    That's madness in the greatest and non-aggressive form. Like:

    • I wanna anime for free, but in Germany pirating copyright cartel products are punishable with severe fines.
    • Yea, so what will you do about that?
    • I will build a f*ckin botnet to avoid detection. No VPN, no proxies. Going raw, going straight to intelligent botnet virus.

    How many people waste their talents like this. Undetected, 8 f*ckin years!

  • SaahibSaahib Host Rep, Veteran
    edited May 2020

    From article:

    It attempted to patch systems to prevent other attackers from hijacking systems, and it managed infected bots across twelve smaller subnets.

    So what his now his only, no one other can exploit what's he exploiting. :smile:

  • LeviLevi Member

    Saahib said: So what his now his only, no one other can exploit what's he exploiting.

    He infects the system, than patch system against the exploited vulnerability in order to prevent others to enter via the same path. If you know other path, you still can infect the system.

  • More technical info here (or just in case you don't want to visit ZDnet for some reason): https://www.forcepoint.com/blog/x-labs/botnets-nas-nvr-devices

    @Saahib said:
    So what his now his only, no one other can exploit what's he exploiting. :smile:

    Well... "Attempted" as it say, it still failed to "owned" the device it you read the full report.

    Thanked by 1FAT32
  • deankdeank Member, Troll
    edited May 2020

    Men of culture should never be punished.

    End of.

  • SaahibSaahib Host Rep, Veteran

    Well, if you are trying on something, you are always trying, if it hits its, well and good, else there are always more. .. thats how this works.

  • jackbjackb Member, Host Rep

    @LTniger said:

    Saahib said: So what his now his only, no one other can exploit what's he exploiting.

    He infects the system, than patch system against the exploited vulnerability in order to prevent others to enter via the same path. If you know other path, you still can infect the system.

    Not really.

    1. System is accessible with an unpatched vulnerability
    2. Attacker breaches system, installs their backdoor (this could even be as simple as a SSH public key - but is likely more complicated)
    3. Attacker patches the system. Nobody can use the vulnerability from step 1, but the attacker still has access.

    There was even a case a while back of someone using a vulnerability to remotely patch all the affected systems without doing anything else in the system.

    Thanked by 1AlwaysSkint
  • NeoonNeoon Community Contributor, Veteran

    A good botnet, rare these days.

    Thanked by 2AlwaysSkint FrankZ
Sign In or Register to comment.