Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Masjesu Botnet Threatens IoT Devices with DDoS Attacks

Masjesu Botnet Threatens IoT Devices with DDoS Attacks

Posted on April 8, 2026 By CWS

Trellix has conducted an in-depth analysis of the Masjesu botnet, a network designed for executing distributed denial-of-service (DDoS) attacks, which has compromised various Internet of Things (IoT) devices.

Masjesu’s Operations and Reach

Active since at least 2023, Masjesu’s operator markets the botnet on Telegram, promoting its capability to execute DDoS attacks with bandwidths reaching several hundred gigabytes. The operator’s messages cater to both Chinese and English-speaking audiences, indicating that their services are intended for users in both China and the United States, according to Trellix.

Although the Telegram channel associated with the botnet currently boasts over 400 subscribers, the actual user base may be more extensive. An earlier channel endorsing the botnet was shut down due to policy breaches.

Global Impact and Infection Spread

Masjesu predominantly targets devices in Vietnam, yet its reach extends to Brazil, India, Iran, Kenya, and Ukraine. Trellix’s data underscores a decentralized attack pattern involving multiple autonomous systems, rather than a single virtual private server hosting the botnet.

The malware has been found to affect multiple device architectures, such as i386, MIPS, ARM, SPARC, PPC, 68K, and AMD64. It utilizes vulnerabilities present in D-Link routers, GPON routers, Huawei home gateways, MVPower DVRs, Netgear routers, UPnP services, and other IoT devices to propagate.

Technical Functionality and Security Concerns

On compromised devices, the malware opens a socket with a preset TCP port, granting operators remote access while ensuring its persistence. It encrypts critical strings, including command-and-control domain names, ports, and process names, and decrypts them during operation.

Masjesu maintains itself by creating a cron job that runs the renamed executable every 15 minutes, converting it into a background process disguised as a legitimate system component. It also disables common processes like wget and curl to avert interference from other malware and scans the internet for vulnerable targets.

The botnet employs multiple command-and-control domains and fallback IPs, setting a 60-second timeout for communications. It can execute diverse DDoS attacks, such as UDP, TCP, VSE, GRE, RDP, OSPF, ICMP, IGMP, TCP_SYN, TCP-ACK, TCP-ACKPSH, and HTTP flood attacks.

As cybersecurity threats evolve, understanding the mechanisms and impacts of botnets like Masjesu remains crucial for developing effective defenses and safeguarding IoT ecosystems.

Security Week News Tags:Botnet, cyber attack, Cybersecurity, D-Link, DDoS, Huawei, internet security, IoT, IoT vulnerabilities, Malware, Masjesu, Netgear, network security, Telegram, Trellix

Post navigation

Previous Post: EvilTokens and AMOS: Major Phishing Threats of March 2026
Next Post: IBM Urges Immediate Patch for Identity Access Vulnerabilities

Related Posts

Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack Security Week News
IoT Security Firm Exein Raises  Million  IoT Security Firm Exein Raises $81 Million  Security Week News
‘ZombieAgent’ Attack Let Researchers Take Over ChatGPT ‘ZombieAgent’ Attack Let Researchers Take Over ChatGPT Security Week News
Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits Security Week News
Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability Security Week News
Lloyds Data Breach Affects 450,000 Mobile Users Lloyds Data Breach Affects 450,000 Mobile Users Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft 365 Network Outage Affects Key Services
  • Chaos Malware Variant Exploits Cloud Vulnerabilities
  • Zero-Day Exploit Threatens Adobe Reader Users
  • US Halts Russian Espionage Using Hacked Routers and DNS Tricks
  • Masjesu Botnet: Global Threat to IoT Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft 365 Network Outage Affects Key Services
  • Chaos Malware Variant Exploits Cloud Vulnerabilities
  • Zero-Day Exploit Threatens Adobe Reader Users
  • US Halts Russian Espionage Using Hacked Routers and DNS Tricks
  • Masjesu Botnet: Global Threat to IoT Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark