Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector

New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector

Posted on December 18, 2025December 18, 2025 By CWS

A newly recognized botnet malware household, dubbed “Udados,” has emerged as a big risk to the Expertise and Telecommunications sectors, orchestrating high-volume HTTP flood Distributed Denial-of-Service (DDoS) assaults.

In accordance with ANY.RUN sandbox evaluation, the botnet leverages contaminated hosts to execute sustained denial-of-service campaigns designed to disrupt enterprise continuity by overwhelming goal servers with legitimate-looking visitors.​

The Udados malware operates by establishing communication with a Command and Management (C2) server to obtain assault directions.

Contaminated hosts ship structured JSON knowledge to the C2, together with detailed system metadata: person ID (Uid), process execution standing (St), bot model (Bv), and privilege degree (Priv). This telemetry permits the operator to handle the botnet’s assets successfully.​

Upon check-in, the C2 server responds with particular assault instructions. The first directive noticed is !httppost, which triggers the DDoS module. This command contains parameters for the assault length (e.g., 888 seconds), the variety of concurrent threads (e.g., 88), and a Base64-encoded payload containing random knowledge.

Udados Botnet

Using HTTP POST requests permits the assault visitors to mix seamlessly with professional internet visitors, making detection and mitigation considerably tougher for community defenders.​

Infrastructure and Community Indicators

The botnet’s infrastructure is hosted inside Autonomous System AS214943, also called RAILNET. This community has not too long ago gained a status as a haven for malicious exercise; latest intelligence studies point out that RAILNET has hosted infrastructure for over 30 distinct malware households in late 2025, together with main threats like Remcos and Amadey.

The precise C2 server recognized on this marketing campaign is positioned at IP handle 178.16.54[.]87.​

The malware communicates by way of the URI /uda/ph.php, which serves as a important indicator for community monitoring. Defenders can detect potential infections by inspecting outbound HTTP visitors for this particular path and the attribute JSON parameters (uid, st, msg, tid) within the request physique.

Organizations are suggested to behave quick and block visitors to the recognized C2 infrastructure and monitor for the next indicators:

TypeValueSHA2567e2350cda89ffedc7bd060962533ff1591424cd2aa19cd0bef219ebd576566bb​SHA256770d78f34395c72191c8b865c08b08908dff6ac572ade06396d175530b0403b8 ​IPv4178.16.54[.]87 (Hosted on RAILNET)​Domainryxuz[.]com ​URI Path/uda/ph.php

Community directors also needs to examine short-term spikes in outbound HTTP visitors from particular person hosts, as this habits typically precedes the high-volume flood orchestrated by the C2.​

Establish cyber threats early to behave quick With Interactive Sandbox => Strive Now

Cyber Security News Tags:Attacks, Botnet, DDoS, Flood, HTTP, Launches, Massive, Sector, Targeting, Tech, Udados

Post navigation

Previous Post: UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
Next Post: China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

Related Posts

Hackers Compromise Active Directory to Steal NTDS.dit that Leads to Full Domain Compromise Hackers Compromise Active Directory to Steal NTDS.dit that Leads to Full Domain Compromise Cyber Security News
ClickFix Malware Attacks macOS Users to Steal Login Credentials ClickFix Malware Attacks macOS Users to Steal Login Credentials Cyber Security News
Windows 11 Update Causes Sign-In Issues for Key Apps Windows 11 Update Causes Sign-In Issues for Key Apps Cyber Security News
A New Tool that Automates GitHub Device Code Phishing Attack A New Tool that Automates GitHub Device Code Phishing Attack Cyber Security News
Snake Keyloggers Abuse Java Utilities to Evade Security Tools Snake Keyloggers Abuse Java Utilities to Evade Security Tools Cyber Security News
Critical Malware Alert for Popular Linux Compression Tool Critical Malware Alert for Popular Linux Compression Tool Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark