Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

L7 DDoS Botnet Hijacked 5.76M Devices to Launch Massive Attacks

Posted on September 11, 2025September 11, 2025 By CWS

In early March 2025, safety groups first noticed an unprecedented L7 DDoS botnet focusing on internet functions throughout a number of sectors.

The botnet, quickly increasing from an preliminary 1.33 million compromised units, employed HTTP GET floods to exhaust server assets and circumvent conventional charge limiting.

By mid-Could, the risk escalated because the botnet grew to 4.6 million nodes, leveraging compromised IoT units and poorly secured endpoints to amplify its assault floor.

By September, this sprawling community had mobilized 5.76 million IP addresses for a coordinated assault on a authorities group, producing tens of tens of millions of requests per second.

Qrator Labs analysts famous vital shifts in geographical distribution, with Brazil, Vietnam, and america rising as main sources of malicious site visitors.

The assault unfolded in two waves: an preliminary surge partaking roughly 2.8 million units, adopted an hour later by an extra 3 million nodes.

HTTP headers within the second wave revealed randomized Person-Agent strings designed to evade easy site visitors filtering.

Qrator Labs researchers recognized key diversifications within the botnet’s management mechanism that facilitated its fast scaling.

The malware communicates over encrypted channels with a decentralized command-and-control (C2) infrastructure, which the attackers rotate often to keep away from blacklisting.

Signature-based mitigation struggled to maintain tempo as every C2 endpoint was energetic for mere hours earlier than rotation.

An infection Mechanism and Persistence

The core an infection vector depends on brute-force exploitation of default credentials and unpatched vulnerabilities in frequent IoT firmware.

As soon as inside a tool, the malware deploys a light-weight rootkit that hooks into community interfaces and intercepts firmware replace routines.

A code snippet extracted by Qrator Labs illustrates the persistence technique:-

// Intercept firmware replace calls
int hook_update(char *path) {
if (!strcmp(path, “/usr/bin/fw_update”)) {
launch_payload();
return 0;
}
return orig_update(path);
}

This method ensures the malicious modules reload after every system restart, rendering easy reboot-based remediation ineffective.

The stealthy rootkit additionally suppresses suspicious course of listings, additional complicating detection and removing.

Increase your SOC and assist your crew defend your corporation with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:5.76M, Attacks, Botnet, DDoS, Devices, Hijacked, Launch, Massive

Post navigation

Previous Post: Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity
Next Post: Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks

Related Posts

CrowdStrike Fires Insider for Sharing Internal System Details with Hackers Cyber Security News
Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security Cyber Security News
Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure Cyber Security News
New Banking Malware DoubleTrouble Attacking Users Via Phishing Sites To Steal Banking Credentials Cyber Security News
WordPress Theme RCE Vulnerability Actively Exploited to Take Full Site Control Cyber Security News
Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
  • CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
  • 7 Best Security Awareness Training Platforms For MSPs in 2026
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
  • CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
  • 7 Best Security Awareness Training Platforms For MSPs in 2026
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark