Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Scraper Botnet with 3,600+ Unique Devices Attacking Targets in US and UK

New Scraper Botnet with 3,600+ Unique Devices Attacking Targets in US and UK

Posted on July 10, 2025July 10, 2025 By CWS

Cybersecurity researchers have uncovered a classy scraper botnet comprising greater than 3,600 distinctive gadgets that has been systematically focusing on techniques throughout the US and United Kingdom since April 2025.

The malware marketing campaign represents a big escalation in automated internet scraping assaults, leveraging a globally distributed infrastructure with a regarding focus of compromised gadgets in Taiwan.

The botnet operates by a deceptively easy method, using the user-agent string “Hiya-World/1.0” whereas executing repeated GET requests throughout ports 80-85 in an evenly distributed sample.

Regardless of the seemingly primary user-agent identifier, the true complexity lies within the malware‘s behavioral fingerprinting, which makes conventional detection strategies insufficient for figuring out the menace.

GreyNoise analysts recognized this beforehand untracked variant by superior community fingerprinting strategies, shifting past typical signature-based detection to investigate the precise conduct of contaminated gadgets.

The analysis crew developed a classy detection methodology utilizing JA4+ signatures, making a meta-signature that captures the botnet’s distinctive community conduct patterns.

The geographic distribution reveals a troubling focus, with 1,934 IP addresses originating from Taiwanese networks, representing 54% of the entire botnet infrastructure.

Supply nations (Supply – GreyNoise)

This clustering suggests both widespread compromise of a typical expertise deployed throughout Taiwan or exploitation of a shared vulnerability affecting native techniques.

Superior Detection By Behavioral Evaluation

The breakthrough in figuring out this botnet got here by implementing JA4+ signature evaluation, which mixes JA4H (HTTP fingerprint) and JA4T (TCP fingerprint) applied sciences.

The JA4H element captures how HTTP headers are ordered and formatted, whereas JA4T encodes the particular method through which gadgets set up community connections.

This behavioral method creates a detection signature that can’t be simply spoofed or evaded, because it depends on basic community conduct fairly than simply manipulated identifiers.

Consumer-Agent: Hiya-World/1.0
Ports: 80-85 (distributed)
Technique: GET requests
Sample: Repeated, systematic focusing on

Among the many recognized IP addresses, 1,359 have been categorised as malicious, with an extra 122 marked as suspicious, indicating the botnet’s energetic menace profile.

Examine reside malware conduct, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Attacking, Botnet, Devices, Scraper, Targets, Unique

Post navigation

Previous Post: What Can Businesses Do About Ethical Dilemmas Posed by AI?
Next Post: Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack

Related Posts

Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data Cyber Security News
NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems Cyber Security News
New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines Cyber Security News
New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats Cyber Security News
Critical Flaw in Windows Admin Center Enables Privilege Escalation Critical Flaw in Windows Admin Center Enables Privilege Escalation Cyber Security News
New tool to Remove Copilot, Recall and Other AI tools From Windows 11 New tool to Remove Copilot, Recall and Other AI tools From Windows 11 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark