Ben

244 posts

Ben banner
Ben

Ben

@deobfuscately

threat intel @castle_io | building @synthient

Seattle, WA Beigetreten Kasım 2024
87 Folgt173 Follower
Binesi
Binesi@whyherro1·
@FBIAnchorage Wait, was the botnet named Mossad or was Mossad operating one of the botnets?
English
1
0
0
30
FBI Anchorage
FBI Anchorage@FBIAnchorage·
🚨JUST IN🚨The Defense Criminal Investigative Service (DCIS), FBI Anchorage, and international partners disrupted four of the world’s largest Internet of Things (IoT) botnets that together were responsible for millions of infected devices and hundreds of thousands of DDoS attacks worldwide. 🔗ow.ly/PBQb50YwAHN @USAO_AK | @DoD_IG
FBI Anchorage tweet media
English
58
662
1.9K
40.5K
Damian Menscher
Damian Menscher@menscher·
In 2025 botnets started using residential proxy networks (like IPIDEA which Google disrupted in Jan) to spread to vulnerable IoT within home networks. DDoS quadrupled in size, a step change in the expected exponential growth trend (here shown on a log scale).
Damian Menscher tweet media
English
2
3
12
511
Ben retweetet
Synthient
Synthient@synthient·
Synthient Helps Disrupt World's Largest DDoS Botnet The U.S. Department of Justice, in coordination with international law enforcement, has announced a major operation to disrupt the infrastructure of four of the world’s largest IoT botnets, including Aisuru and Kimwolf. Together, these botnets hijacked over three million devices worldwide to launch record-breaking Distributed Denial of Service (DDoS) attacks. The Kimwolf botnet specifically targeted devices traditionally firewalled from the broader internet, enslaving them to act as proxy traffic for criminal networks and launch attacks reaching up to 30 Terabits per second. Synthient is proud to have contributed to the DOJ's efforts. By identifying active exploitation, sharing malware samples, and coordinating disclosures with impacted parties, we helped neutralize this threat. We remain dedicated to making the web a safer place and are grateful to have played a role in this historic takedown. Link: justice.gov/usao-ak/pr/aut…
English
0
1
5
258
Ben
Ben@deobfuscately·
GIF
QME
0
0
1
129
Ben
Ben@deobfuscately·
Potassium Botnet Installer: http://169[.]40[.]135[.]69/1000mgofpotassiumaday/arm7 C2: potassium[.]vitacocoyougolocobecauseyouaresodamndeliciocobarampam[.]st #ioc #hunting #mirai
Ben tweet media
Indonesia
1
8
51
4K
Ben
Ben@deobfuscately·
@vxdb 🔥
QME
0
0
0
91
Alex. Turing
Alex. Turing@TuringAlex·
🚨#Botnet In February, an invisible war broke out within #Android TV Boxes between #Bigpanzi and #Kimwolf. Bigpanzi issued the "pm uninstall" command to remove Kimwolf's APK,哈哈,果然同行是冤家😂 Happy hunting 🍷@Xlab_qax
Alex. Turing tweet media
English
1
7
43
4.5K
Ben
Ben@deobfuscately·
Not just bigpanzi 😄 other tv boxes also observed removing it [ "com.n2.systemservice06", "com.n2.systemservice061", "com.n2.systemservice062", "com.n2.systemservice063", "com.n2.systemservice0644", "com.android.systemservice0644", "com.a.androidsvc", "com.k.sdk", "com.abcproxy.proxysdk", "com.abcproxy.lolsdk" ]
English
1
0
3
254
Ben retweetet
Karsten Hahn
Karsten Hahn@struppigel·
I have said this quite a few times, but there is this misconception that the scanning engines on VT tell you whether the AV product detects the malware. They do not.
English
6
13
111
34.3K
Ben
Ben@deobfuscately·
Ben tweet media
ZXX
0
0
0
294
Ben
Ben@deobfuscately·
#IPIDEA Post Google takedown stats across all internal pools. Slowly shifting towards relying on 3rd party providers for IP sourcing instead of IPIDEA SDKs.
Ben tweet media
English
1
0
4
434
Ben retweetet
vxdb
vxdb@vxdb·
Google’s Threat Intelligence Team just disrupted one of the largest residential proxy network, IPIDEA. Read more: cloud.google.com/blog/topics/th…
English
2
19
122
10.8K
Ben retweetet
Wafer4014
Wafer4014@Wafer4014·
bye bye ipdea
Wafer4014 tweet media
HT
1
1
2
286
Ben
Ben@deobfuscately·
@HackingLZ New bubble indicator
Italiano
0
0
0
20
mRr3b00t
mRr3b00t@UK_Daniel_Card·
You can see a mixture of vertical attacks and horizontal attacks....
mRr3b00t tweet media
English
3
0
9
786
mRr3b00t
mRr3b00t@UK_Daniel_Card·
I exposed RDP to the internet for a year... it was hit with over 7 million authentication attempts from cyber criminals/botnets etc. that's about 20K login attempts per day! to a single server. #CyberCrime #Reality
mRr3b00t tweet media
English
2
2
22
1.5K
Ben
Ben@deobfuscately·
Interesting growth. Scanning observed on Jan 7th
Ben tweet media
English
0
0
1
447
Ben
Ben@deobfuscately·
Since the disclosure of the #kimwolf exploit we are starting to observe other proxy providers attempting to make their own land grab for vulnerable devices.
Ben tweet media
English
2
0
3
622
Ben
Ben@deobfuscately·
Installer: 89.125.255[.]206:8001 Backdoor: 89.125.255[.]206:8000 C2s: peer.packetstream-sdk[.]su, peer.packetstream-sdk[.]ru
Ben tweet media
English
1
0
4
458