Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SystemBC Botnet Survives Takedown, Infects 10,000 Devices

SystemBC Botnet Survives Takedown, Infects 10,000 Devices

Posted on February 5, 2026 By CWS

The SystemBC botnet, a notorious malware loader, has evaded a recent law enforcement operation and currently affects over 10,000 computers globally, cybersecurity experts from Silent Push reveal. Originally identified in 2019, SystemBC operates as a backdoor, exploiting compromised devices to proxy internet traffic.

SystemBC’s Continued Threat

Known by aliases such as Coroxy and DroxiDat, SystemBC has been implicated in spreading ransomware and other harmful software. Despite a targeted crackdown by authorities in May 2024, known as Operation Endgame, the botnet’s operations have persisted. Cybersecurity firm Silent Push reports ongoing updates from the malware’s developer on underground forums.

Currently, SystemBC-related traffic is emanating from more than 10,000 IP addresses, with significant concentrations in the United States (4,300), Germany (829), France (448), Singapore (419), and India (294). The malware predominantly targets hosting providers, with identified cases in Burkina Faso and Vietnam.

Technical Insights into SystemBC

SystemBC transforms infected devices into SOCKS5 proxies, facilitating the rerouting of internet traffic to obscure malicious activities and potentially generate illicit profits. The malware employs a dynamic architecture, connecting clients to exposed command-and-control (C&C) servers, which redirect traffic across infected systems.

Analysis of the communications within the botnet has unveiled a Perl-based version of SystemBC targeting Linux environments, suggesting the developer is a Russian speaker. Although primarily known for targeting Windows systems, many compromised hosts have also been linked to attacks on WordPress sites.

Implications for Cybersecurity

Silent Push warns that the infrastructure associated with SystemBC poses a continuous threat, serving as a critical component at the beginning of cyber intrusion chains and being utilized by various threat actors. Ongoing surveillance is essential to mitigate risks, as SystemBC’s activities often precede ransomware attacks and other malicious operations.

Given its resilience and widespread impact, SystemBC remains a significant concern for cybersecurity professionals worldwide. The persistence of such botnets underscores the need for enhanced security measures and international cooperation to combat cybercrime effectively.

Related articles from the cybersecurity field highlight similar challenges, such as disruptions to proxy networks by tech giants and legal actions against individuals selling unauthorized network access.

Security Week News Tags:Botnet, command-and-control, cyber threat, Cybersecurity, Malware, network security, Ransomware, SOCKS5 proxy, SystemBC, Takedown

Post navigation

Previous Post: Android Malware Masquerades as RTO Notifications
Next Post: Critical SolarWinds Vulnerability Exposes 170 Installations

Related Posts

New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches Security Week News
Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact Security Week News
Critical Apache Tika Vulnerability Leads to XXE Injection Critical Apache Tika Vulnerability Leads to XXE Injection Security Week News
160,000 Impacted by Wayne Memorial Hospital Data Breach 160,000 Impacted by Wayne Memorial Hospital Data Breach Security Week News
North Korean Hackers Aim at European Drone Companies North Korean Hackers Aim at European Drone Companies Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in WatchGuard VPN Client Allows System-Level Attacks
  • AISURU Botnet Orchestrates Unprecedented 31.4 Tbps DDoS Attack
  • Critical SolarWinds Vulnerability Exposes 170 Installations
  • SystemBC Botnet Survives Takedown, Infects 10,000 Devices
  • Android Malware Masquerades as RTO Notifications

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in WatchGuard VPN Client Allows System-Level Attacks
  • AISURU Botnet Orchestrates Unprecedented 31.4 Tbps DDoS Attack
  • Critical SolarWinds Vulnerability Exposes 170 Installations
  • SystemBC Botnet Survives Takedown, Infects 10,000 Devices
  • Android Malware Masquerades as RTO Notifications

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark