Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

Posted on May 16, 2025May 16, 2025 By CWS

Could 16, 2025Ravie LakshmananUnited States
Cybersecurity researchers are calling consideration to a brand new botnet malware referred to as HTTPBot that has been used to primarily single out the gaming business, in addition to know-how corporations and academic establishments in China.
“Over the previous few months, it has expanded aggressively, constantly leveraging contaminated units to launch exterior assaults,” NSFOCUS mentioned in a report revealed this week. “By using extremely simulated HTTP Flood assaults and dynamic function obfuscation strategies, it circumvents conventional rule-based detection mechanisms.”
HTTPBot, first noticed within the wild in August 2024, will get its identify from using HTTP protocols to launch distributed denial-of-service assaults. Written in Golang, it is one thing of an anomaly given its concentrating on of Home windows techniques.
The Home windows-based botnet trojan is noteworthy for its use in exactly focused assaults aimed toward high-value enterprise interfaces similar to recreation login and fee techniques.
“This assault with ‘scalpel-like’ precision poses a systemic risk to industries that depend on real-time interplay,” the Beijing-headquartered firm mentioned. “HTTPBot marks a paradigm shift in DDoS assaults, shifting from ‘indiscriminate visitors suppression’ to ‘high-precision enterprise strangulation.'”
HTTPBot is estimated to have issued at least 200 assault directions for the reason that begin of April 2025, with the assaults designed to strike the gaming business, know-how corporations, academic establishments, and tourism portals in China.

As soon as put in and run, the malware conceals its graphical person interface (GUI) to sidestep course of monitoring by each customers and safety instruments in an effort to extend the stealthiness of the assaults. It additionally resorts to unauthorized Home windows Registry manipulation to make sure that it is run mechanically on system startup.

The botnet malware then proceeds to ascertain contact with a command-and-control (C2) server to await additional directions to execute HTTP flood assaults in opposition to particular targets by sending a excessive quantity of HTTP requests. It helps numerous assault modules –

BrowserAttack, which includes utilizing hidden Google Chrome situations to imitate legit visitors whereas exhausting server sources
HttpAutoAttack, which makes use of a cookie-based method to precisely simulate legit classes
HttpFpDlAttack, which makes use of the HTTP/2 protocol and opts for an method that seeks to extend the CPU loader on the server by coercing it into returning massive responses
WebSocketAttack, which makes use of “ws://” and “wss://” protocols to ascertain WebSocket connections
PostAttack, which forces using HTTP POST to conduct the assault
CookieAttack, which provides a cookie processing stream based mostly on the BrowserAttack assault methodology

“DDoS Botnet households are likely to congregate on Linux and IoT platforms,” NSFOCUS mentioned. “Nonetheless, the HTTPBot Botnet household has particularly focused the Home windows platform.”
“By deeply simulating protocol layers and mimicking legit browser habits, HTTPBot bypasses defenses that depend on protocol integrity. It additionally constantly occupies server session sources by randomized URL paths and cookie replenishment mechanisms, somewhat than counting on sheer visitors quantity.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Attacks, Botnet, DDoS, Gaming, HTTPBot, Launches, Precision, Sectors, Tech

Post navigation

Previous Post: From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth
Next Post: How to Stay Ahead of Vulnerabilities

Related Posts

Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks The Hacker News
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers The Hacker News
Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns The Hacker News
Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks The Hacker News
SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root The Hacker News
Entra ID Data Protection: Essential or Overkill? The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News