botnets.work
j
@botnets.work
@cryptolaemus.bsky.social
Reposted by j
#ESETresearch, in collaboration with #Microsoft, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry, has helped disrupt #LummaStealer – a notorious malware-as-a-service infostealer. @jakubtomanek.bsky.social www.welivesecurity.com/en/eset-rese... 1/5
ESET takes part in global operation to disrupt Lumma Stealer
Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation
www.welivesecurity.com
May 21, 2025 at 4:16 PM
Reposted by j
The #FBI and #DCIS disrupted #Danabot. #ESET was one of several companies that cooperated in this effort. www.welivesecurity.com/en/eset-rese... 1/6
www.welivesecurity.com
May 22, 2025 at 8:06 PM
Reposted by j
New story, by me:

Oops: DanBot Malware Devs Infected Their Own PCs

The U.S. government today unsealed criminal charges against 16 individuals
accused of operating and selling DanaBot, a prolific strain of
information-stealing malware that has been sold on […]

[Original post on infosec.exchange]
May 22, 2025 at 9:56 PM
New blog with an update on the Socks5Systemz botnet with some interesting details such as which proxy service is currently using it! www.bitsight.com/blog/proxyam... #socks5systemz #proxyam
PROXY.AM Powered by Socks5Systemz Botnet | Bitsight
After a year long investigation, Bitsight TRACE follows up on Socks5Systemz research.
www.bitsight.com
December 4, 2024 at 1:51 PM
Lumen blogs are always interesting 🫡
November 20, 2024 at 10:48 AM
yoooo
November 17, 2024 at 10:14 PM
Reposted by j
We are sharing out Socks5Systemz proxy botnet infected IPs in our free daily SInkhole HTTP Event reports shadowserver.org/what-we-do/n...

Over 36K IPs seen infected 2023-11-12. Thank you Bitsight
for the collaboration!

Socks5Systemz Infection tracker: dashboard.shadowserver.org/statistics/c...
November 14, 2023 at 9:47 AM
Hello world. What’s up? Am I late to the party?
June 16, 2023 at 7:37 PM