Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices

Posted on June 18, 2025June 18, 2025 By CWS

The RapperBot botnet has reached unprecedented scale, with safety researchers observing over 50,000 lively bot infections focusing on community edge units throughout the globe.

This refined malware marketing campaign represents probably the most persistent and evolving cyber threats presently plaguing internet-connected infrastructure, demonstrating outstanding adaptability and technical sophistication since its preliminary emergence.

First disclosed by CNCERT in July 2022, RapperBot’s actions might be traced again to 2021 in response to earlier safety analysis.

The botnet has maintained constant evolution by a number of variants, with seven distinct iterations captured by researchers over the previous yr alone.

What units RapperBot other than typical botnets is its provocative nature, with malware authors embedding taunting messages and references to rap music, together with hyperlinks to songs and challenges directed at safety researchers.

Qi’anxin X Lab analysts recognized that RapperBot has just lately escalated past conventional distributed denial-of-service assaults to incorporate extortion techniques, demanding $5,000 in Monero cryptocurrency from victims to keep away from continued assaults.

The botnet has demonstrated its functionality by focusing on high-profile platforms together with the factitious intelligence service DeepSeek throughout February 2025 and social media platform Twitter in mid-March.

Geographic evaluation reveals that China faces the very best focus of assaults, although the botnet’s attain extends globally throughout varied trade sectors together with public administration, manufacturing, and monetary providers.

The an infection scale turned obvious when researchers proactively registered unused command-and-control domains, revealing peak bot populations exceeding 50,000 distinctive IP addresses.

Main targets embody IoT units with public community entry, significantly community cameras, dwelling routers, and enterprise networking tools that sometimes possess weak default credentials or unpatched firmware vulnerabilities.

An infection Mechanisms and Vulnerability Exploitation

RapperBot employs a multi-vector method for preliminary gadget compromise, primarily leveraging weak Telnet credentials mixed with exploitation of identified safety vulnerabilities.

The botnet systematically targets units by automated scanning for default or simply guessable authentication credentials, a method that proves remarkably efficient towards poorly secured IoT infrastructure.

DDoS assault targets (Supply – Qi’anxin X Lab)

The malware’s vulnerability exploitation arsenal encompasses a various vary of gadget varieties and producers. Vital vulnerabilities embody CNVD-2021-79445 affecting Ruijie NBR700 units, CVE-2021-46229 focusing on D-Hyperlink Di-7200G routers, and CVE-2023-4473 exploiting Zyxel NAS326 methods.

Extra assault vectors goal KGUARD DVR methods by TCP_MSGHEAD_CMD vulnerabilities, Reolink units through BaiChuan distant code execution flaws, and varied CCTV-DVR methods from a number of distributors.

def decodeTXT(knowledge:str):
key = “ipWPeY43MhfFBt8ZCSN2KTdD6nEkmGjwx7vJR5rogzbcqHsXUQuyVA9L”
a = key. Discover(knowledge[0])
b = key. Discover(knowledge[1])
seed = 56*a+b

The botnet’s command-and-control infrastructure makes use of an revolutionary DNS-TXT document system for C2 communication, using customized encryption algorithms which have advanced throughout a number of marketing campaign iterations.

Energy up early risk detection, escalation, and mitigation with ANY.RUN’s Menace Intelligence Lookup. Get 50 trial searches.

Cyber Security News Tags:Attack, Attacks, Botnet, Devices, Edge, Network, Peaks, RapperBot, Targeting

Post navigation

Previous Post: Critical Vulnerability Patched in Citrix NetScaler
Next Post: 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub

Related Posts

New eSIM Hack Let Attackers Clone Profiles and Hijack Phone Identities Cyber Security News
20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled Cyber Security News
Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts Cyber Security News
New Vulnerability Affects All Intel Processors From The Last 6 Years Cyber Security News
DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats Cyber Security News
Realtek Vulnerability Let Attackers Trigger DoS Attack via Bluetooth Secure Connections Pairing Process Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
  • Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
  • Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
  • New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
  • Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
  • Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
  • New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News