Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SystemBC Botnet Expands to 10,000 Devices for Global Attacks

SystemBC Botnet Expands to 10,000 Devices for Global Attacks

Posted on February 4, 2026 By CWS

The SystemBC malware, a notorious threat since 2019, has expanded into an extensive botnet infrastructure, now controlling over 10,000 devices worldwide. This malware primarily operates as a SOCKS5 proxy and backdoor, allowing cybercriminals to conceal their malicious traffic and maintain access to compromised networks over extended periods.

SystemBC’s Evolving Architecture

By transforming infected devices into communication relays, SystemBC enables attackers to route command-and-control traffic through victim machines. This technique obscures their true locations, making it challenging for defenders to trace and attribute attacks accurately. Despite efforts by law enforcement, such as Europol’s Operation Endgame in May 2024, the botnet remains resilient, adapting its tactics by targeting hosting providers instead of residential networks.

This strategic shift has resulted in longer infection durations, with systems remaining compromised for an average of 38 days, and some cases extending over 100 days. The botnet is a precursor to ransomware attacks, facilitating data theft and further exploitation by tunneling traffic.

Global Impact and Targeted Regions

Research by Silent Push analysts highlights the resurgence of SystemBC, with sophisticated tracking of infected IP addresses worldwide. The United States emerges as the primary target, with over 4,300 compromised devices. Other significant concentrations are identified in Germany, France, and Singapore. Notably, sensitive government environments in Vietnam and Burkina Faso have also experienced breaches, with high-density servers hosting official websites being compromised.

These compromised assets are often exploited to launch additional attacks or support other criminal activities, raising concerns about cybersecurity defenses in critical infrastructures.

Undetected Perl Variant and Security Implications

A critical discovery in this campaign involves a previously undocumented SystemBC variant written in Perl, designed to evade traditional security controls. This variant, initially undetected by major antivirus engines, is typically deployed by ELF binary droppers known as “SafeObject” and “StringHash.” These droppers utilize UPX packing to obscure their malicious code, complicating static analysis.

Upon execution, the droppers search for writable directories on the host system and deploy hundreds of embedded payloads. The dropper code is notably “noisy” and contains Russian-language strings, potentially indicating the threat actor’s origins. Given SystemBC’s role in early intrusion stages, security teams are advised to monitor these indicators proactively to prevent escalation to ransomware attacks.

Stay updated on cybersecurity developments by following us on Google News, LinkedIn, and X. Set CSN as your preferred source in Google for instant updates.

Cyber Security News Tags:Botnet, cyber threats, Cybercrime, Cybersecurity, DDoS attacks, internet security, Malware, Ransomware, SOCKS5 proxy, SystemBC

Post navigation

Previous Post: ValleyRAT Malware Uses Fake LINE Installer to Steal Data
Next Post: Microsoft Unveils Tool to Detect AI Model Backdoors

Related Posts

CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday Cyber Security News
Microsoft SQL Server Vulnerability Allows Attackers to Elevate Privileges over a Network Microsoft SQL Server Vulnerability Allows Attackers to Elevate Privileges over a Network Cyber Security News
Qilin Ransomware Leveraging Mspaint and Notepad to Find Files with Sensitive Information Qilin Ransomware Leveraging Mspaint and Notepad to Find Files with Sensitive Information Cyber Security News
TrustAsia Revoked 143 Certificates Following LiteSSL ACME Service Vulnerability TrustAsia Revoked 143 Certificates Following LiteSSL ACME Service Vulnerability Cyber Security News
Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure Cyber Security News
ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
  • PhantomVAI Loader Utilizes RunPE for Stealthy Attacks
  • Microsoft Unveils Tool to Detect AI Model Backdoors
  • SystemBC Botnet Expands to 10,000 Devices for Global Attacks
  • ValleyRAT Malware Uses Fake LINE Installer to Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
  • PhantomVAI Loader Utilizes RunPE for Stealthy Attacks
  • Microsoft Unveils Tool to Detect AI Model Backdoors
  • SystemBC Botnet Expands to 10,000 Devices for Global Attacks
  • ValleyRAT Malware Uses Fake LINE Installer to Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark