Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SystemBC Botnet Survives Takedown, Infects 10,000 Devices

SystemBC Botnet Survives Takedown, Infects 10,000 Devices

Posted on February 5, 2026 By CWS

The SystemBC botnet, a notorious malware loader, has evaded a recent law enforcement operation and currently affects over 10,000 computers globally, cybersecurity experts from Silent Push reveal. Originally identified in 2019, SystemBC operates as a backdoor, exploiting compromised devices to proxy internet traffic.

SystemBC’s Continued Threat

Known by aliases such as Coroxy and DroxiDat, SystemBC has been implicated in spreading ransomware and other harmful software. Despite a targeted crackdown by authorities in May 2024, known as Operation Endgame, the botnet’s operations have persisted. Cybersecurity firm Silent Push reports ongoing updates from the malware’s developer on underground forums.

Currently, SystemBC-related traffic is emanating from more than 10,000 IP addresses, with significant concentrations in the United States (4,300), Germany (829), France (448), Singapore (419), and India (294). The malware predominantly targets hosting providers, with identified cases in Burkina Faso and Vietnam.

Technical Insights into SystemBC

SystemBC transforms infected devices into SOCKS5 proxies, facilitating the rerouting of internet traffic to obscure malicious activities and potentially generate illicit profits. The malware employs a dynamic architecture, connecting clients to exposed command-and-control (C&C) servers, which redirect traffic across infected systems.

Analysis of the communications within the botnet has unveiled a Perl-based version of SystemBC targeting Linux environments, suggesting the developer is a Russian speaker. Although primarily known for targeting Windows systems, many compromised hosts have also been linked to attacks on WordPress sites.

Implications for Cybersecurity

Silent Push warns that the infrastructure associated with SystemBC poses a continuous threat, serving as a critical component at the beginning of cyber intrusion chains and being utilized by various threat actors. Ongoing surveillance is essential to mitigate risks, as SystemBC’s activities often precede ransomware attacks and other malicious operations.

Given its resilience and widespread impact, SystemBC remains a significant concern for cybersecurity professionals worldwide. The persistence of such botnets underscores the need for enhanced security measures and international cooperation to combat cybercrime effectively.

Related articles from the cybersecurity field highlight similar challenges, such as disruptions to proxy networks by tech giants and legal actions against individuals selling unauthorized network access.

Security Week News Tags:Botnet, command-and-control, cyber threat, Cybersecurity, Malware, network security, Ransomware, SOCKS5 proxy, SystemBC, Takedown

Post navigation

Previous Post: Android Malware Masquerades as RTO Notifications
Next Post: Critical SolarWinds Vulnerability Exposes 170 Installations

Related Posts

Canadian Airline WestJet Says Hackers Stole Customer Data Canadian Airline WestJet Says Hackers Stole Customer Data Security Week News
SonicWall Patches Critical SMA 100 Vulnerability, Warns of Recent Malware Attack SonicWall Patches Critical SMA 100 Vulnerability, Warns of Recent Malware Attack Security Week News
QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability Security Week News
Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect Security Week News
Fog Ransomware Attack Employs Unusual Tools Fog Ransomware Attack Employs Unusual Tools Security Week News
British Man Suspected of Being the Hacker IntelBroker Arrested, Charged British Man Suspected of Being the Hacker IntelBroker Arrested, Charged Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News