Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices

RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices

Posted on June 18, 2025June 18, 2025 By CWS

The RapperBot botnet has reached unprecedented scale, with safety researchers observing over 50,000 lively bot infections focusing on community edge units throughout the globe.

This refined malware marketing campaign represents probably the most persistent and evolving cyber threats presently plaguing internet-connected infrastructure, demonstrating outstanding adaptability and technical sophistication since its preliminary emergence.

First disclosed by CNCERT in July 2022, RapperBot’s actions might be traced again to 2021 in response to earlier safety analysis.

The botnet has maintained constant evolution by a number of variants, with seven distinct iterations captured by researchers over the previous yr alone.

What units RapperBot other than typical botnets is its provocative nature, with malware authors embedding taunting messages and references to rap music, together with hyperlinks to songs and challenges directed at safety researchers.

Qi’anxin X Lab analysts recognized that RapperBot has just lately escalated past conventional distributed denial-of-service assaults to incorporate extortion techniques, demanding $5,000 in Monero cryptocurrency from victims to keep away from continued assaults.

The botnet has demonstrated its functionality by focusing on high-profile platforms together with the factitious intelligence service DeepSeek throughout February 2025 and social media platform Twitter in mid-March.

Geographic evaluation reveals that China faces the very best focus of assaults, although the botnet’s attain extends globally throughout varied trade sectors together with public administration, manufacturing, and monetary providers.

The an infection scale turned obvious when researchers proactively registered unused command-and-control domains, revealing peak bot populations exceeding 50,000 distinctive IP addresses.

Main targets embody IoT units with public community entry, significantly community cameras, dwelling routers, and enterprise networking tools that sometimes possess weak default credentials or unpatched firmware vulnerabilities.

An infection Mechanisms and Vulnerability Exploitation

RapperBot employs a multi-vector method for preliminary gadget compromise, primarily leveraging weak Telnet credentials mixed with exploitation of identified safety vulnerabilities.

The botnet systematically targets units by automated scanning for default or simply guessable authentication credentials, a method that proves remarkably efficient towards poorly secured IoT infrastructure.

DDoS assault targets (Supply – Qi’anxin X Lab)

The malware’s vulnerability exploitation arsenal encompasses a various vary of gadget varieties and producers. Vital vulnerabilities embody CNVD-2021-79445 affecting Ruijie NBR700 units, CVE-2021-46229 focusing on D-Hyperlink Di-7200G routers, and CVE-2023-4473 exploiting Zyxel NAS326 methods.

Extra assault vectors goal KGUARD DVR methods by TCP_MSGHEAD_CMD vulnerabilities, Reolink units through BaiChuan distant code execution flaws, and varied CCTV-DVR methods from a number of distributors.

def decodeTXT(knowledge:str):
key = “ipWPeY43MhfFBt8ZCSN2KTdD6nEkmGjwx7vJR5rogzbcqHsXUQuyVA9L”
a = key. Discover(knowledge[0])
b = key. Discover(knowledge[1])
seed = 56*a+b

The botnet’s command-and-control infrastructure makes use of an revolutionary DNS-TXT document system for C2 communication, using customized encryption algorithms which have advanced throughout a number of marketing campaign iterations.

Energy up early risk detection, escalation, and mitigation with ANY.RUN’s Menace Intelligence Lookup. Get 50 trial searches.

Cyber Security News Tags:Attack, Attacks, Botnet, Devices, Edge, Network, Peaks, RapperBot, Targeting

Post navigation

Previous Post: Critical Vulnerability Patched in Citrix NetScaler
Next Post: 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub

Related Posts

North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands Cyber Security News
AI-Powered FunkLocker Ransomware Leverages Windows utilities to Disable Defenses AI-Powered FunkLocker Ransomware Leverages Windows utilities to Disable Defenses Cyber Security News
Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Cyber Security News
Beware of Malicious Steam Cleanup Tool Attack Windows Machines to Deploy Backdoor Malware Beware of Malicious Steam Cleanup Tool Attack Windows Machines to Deploy Backdoor Malware Cyber Security News
Authentication Coercion Attack Tricks Windows Machines into Revealing Credentials to Attack-controlled Servers Authentication Coercion Attack Tricks Windows Machines into Revealing Credentials to Attack-controlled Servers Cyber Security News
Critical Apache Tika Core Vulnerability Exploited by Uploading Malicious PDF Critical Apache Tika Core Vulnerability Exploited by Uploading Malicious PDF Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark