Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

L7 DDoS Botnet Hijacked 5.76M Devices to Launch Massive Attacks

Posted on September 11, 2025September 11, 2025 By CWS

In early March 2025, safety groups first noticed an unprecedented L7 DDoS botnet focusing on internet functions throughout a number of sectors.

The botnet, quickly increasing from an preliminary 1.33 million compromised units, employed HTTP GET floods to exhaust server assets and circumvent conventional charge limiting.

By mid-Could, the risk escalated because the botnet grew to 4.6 million nodes, leveraging compromised IoT units and poorly secured endpoints to amplify its assault floor.

By September, this sprawling community had mobilized 5.76 million IP addresses for a coordinated assault on a authorities group, producing tens of tens of millions of requests per second.

Qrator Labs analysts famous vital shifts in geographical distribution, with Brazil, Vietnam, and america rising as main sources of malicious site visitors.

The assault unfolded in two waves: an preliminary surge partaking roughly 2.8 million units, adopted an hour later by an extra 3 million nodes.

HTTP headers within the second wave revealed randomized Person-Agent strings designed to evade easy site visitors filtering.

Qrator Labs researchers recognized key diversifications within the botnet’s management mechanism that facilitated its fast scaling.

The malware communicates over encrypted channels with a decentralized command-and-control (C2) infrastructure, which the attackers rotate often to keep away from blacklisting.

Signature-based mitigation struggled to maintain tempo as every C2 endpoint was energetic for mere hours earlier than rotation.

An infection Mechanism and Persistence

The core an infection vector depends on brute-force exploitation of default credentials and unpatched vulnerabilities in frequent IoT firmware.

As soon as inside a tool, the malware deploys a light-weight rootkit that hooks into community interfaces and intercepts firmware replace routines.

A code snippet extracted by Qrator Labs illustrates the persistence technique:-

// Intercept firmware replace calls
int hook_update(char *path) {
if (!strcmp(path, “/usr/bin/fw_update”)) {
launch_payload();
return 0;
}
return orig_update(path);
}

This method ensures the malicious modules reload after every system restart, rendering easy reboot-based remediation ineffective.

The stealthy rootkit additionally suppresses suspicious course of listings, additional complicating detection and removing.

Increase your SOC and assist your crew defend your corporation with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:5.76M, Attacks, Botnet, DDoS, Devices, Hijacked, Launch, Massive

Post navigation

Previous Post: Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity
Next Post: Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks

Related Posts

Linux Legitimate System Behaviours Weaponized to Harvest Secrets from Shared Environments Cyber Security News
How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort Cyber Security News
Threat actors Breach High Value targets like Google in Salesforce Attacks Cyber Security News
Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control Cyber Security News
Allianz Life Insurance Data Breach Cyber Security News
Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chainguard Raises $280 Million in Growth Funding
  • Predatory Sparrow Group Attacking Critical Infrastructure to Destroy Data and Cause Disruption
  • Massive China-Linked Smishing Campaign Leveraged 194,000 Domains
  • North Korean Chollima Actors Added BeaverTail and OtterCookie to Its Arsenal
  • WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chainguard Raises $280 Million in Growth Funding
  • Predatory Sparrow Group Attacking Critical Infrastructure to Destroy Data and Cause Disruption
  • Massive China-Linked Smishing Campaign Leveraged 194,000 Domains
  • North Korean Chollima Actors Added BeaverTail and OtterCookie to Its Arsenal
  • WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News