Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Mirai Botnet Exploits ADB in IoT for DDoS Attacks

New Mirai Botnet Exploits ADB in IoT for DDoS Attacks

Posted on May 6, 2026 By CWS

Cybersecurity experts have identified a new variant of the notorious Mirai botnet, labeled as xlabs_v1, which targets devices exposed to the internet via the Android Debug Bridge (ADB). This botnet is engineered to commandeer such devices for executing distributed denial-of-service (DDoS) attacks.

Exploiting ADB Vulnerabilities

Hunt.io researchers discovered this botnet after accessing an unsecured directory on a server located in the Netherlands, specified by the IP address “176.65.139[.]44”. This discovery highlighted the botnet’s ability to support a variety of attack methods, including 21 flood variants across TCP, UDP, and raw protocols. Notable among these are RakNet and OpenVPN-shaped UDP floods, designed to bypass standard DDoS protections.

The xlabs_v1 botnet uniquely targets Android devices with an exposed ADB service on TCP port 5555. Devices like Android TV boxes, set-top boxes, and smart TVs with ADB enabled by default are particularly vulnerable to this threat.

Technical Aspects and Attack Strategy

The malware not only utilizes an Android APK named “boot.apk” but also supports multiple architectures such as ARM, MIPS, x86-64, and ARC. This indicates its potential to compromise residential routers and various IoT devices. Once a device is infected, it communicates with the operator’s control panel at “xlabslover[.]lol” to initiate DDoS attacks, particularly against gaming servers.

The malware is delivered through ADB-shell commands, specifically targeting ARM hardware with ADB enabled. It opens 8,192 parallel TCP connections to the closest Speedtest server to measure bandwidth, classifying each compromised device into a pricing tier for customers of the DDoS-for-hire service.

Operational Characteristics and Threat Actor

A distinctive feature of xlabs_v1 is its lack of a persistence mechanism. After relaying bandwidth data, the botnet exits, requiring re-infection for sustained control. This suggests that the operator prioritizes bandwidth assessment over continuous device control.

The botnet includes a “killer” component to eliminate rival malware, maximizing its use of available bandwidth for its own attacks. While the identity of the threat actor remains unknown, the name “Tadashi” is embedded in the botnet’s code.

Additional findings revealed a Monero cryptocurrency mining toolkit on a related server, although it’s unclear if the same actor is responsible for both activities.

According to Hunt.io, xlabs_v1 is positioned as a mid-tier commercial threat. It competes on cost and attack variety rather than on technical complexity. Its primary targets are consumer IoT devices, residential routers, and small-scale gaming servers.

Implications for Cybersecurity

The emergence of xlabs_v1 underscores the persistent threat of cyberattacks on the gaming industry and other sectors reliant on network infrastructure. Darktrace reported similar incidents involving misconfigured Jenkins instances used to deploy DDoS botnets, highlighting the need for robust security measures.

This development serves as a critical reminder for operators of game servers and IoT devices to implement effective defenses against such evolving threats.

The Hacker News Tags:ADB vulnerability, botnet exploitation, cyber threats, Cybersecurity, DDoS attacks, IoT security, malware analysis, Mirai botnet, network security, tech news

Post navigation

Previous Post: Russian Ransomware Operator Sentenced to 102 Months
Next Post: Critical Flaw in Argo CD Exposes Sensitive Kubernetes Data

Related Posts

Microsoft Fixes 84 Security Flaws, Including Two Zero-Days Microsoft Fixes 84 Security Flaws, Including Two Zero-Days The Hacker News
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks The Hacker News
Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam The Hacker News
Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more The Hacker News
Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers The Hacker News
Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Taiwan Rail Network Disrupted by Radio Signal Spoofing
  • Critical Flaw in Argo CD Exposes Sensitive Kubernetes Data
  • New Mirai Botnet Exploits ADB in IoT for DDoS Attacks
  • Russian Ransomware Operator Sentenced to 102 Months
  • New Linux Malware Poses Threat to Software Developers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Taiwan Rail Network Disrupted by Radio Signal Spoofing
  • Critical Flaw in Argo CD Exposes Sensitive Kubernetes Data
  • New Mirai Botnet Exploits ADB in IoT for DDoS Attacks
  • Russian Ransomware Operator Sentenced to 102 Months
  • New Linux Malware Poses Threat to Software Developers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark