TrntyTryHackMe | Introduction To Honeypots WalkthroughA guided room covering the deployment of honeypots and analysis of botnet activitiesSep 7
Team Cymru - visibility into global cyber threatsBotnet 7777: Are You Betting on a Compromised Router?A “7777 botnet” was first referenced in public reporting in October 2023 by Gi7w0rm. At the time, it was described as a botnet with…Nov 25Nov 25
Gi7w0rmThe curious case of the 7777-BotnetHello there and welcome back again to yet another blog post. Today, I am reporting on something I have been investigating for a while now…Oct 19, 20232Oct 19, 20232
Jacob MasseCaught in a Honeypot: Analyzing New-Age Malware, Infection Processes + TechniquesAs malware evolves, organizations and hobbyist individuals with an interest in cybersecurity must keep honeypots active. Honeypots serve as…Sep 17Sep 17
TrntyTryHackMe | Introduction To Honeypots WalkthroughA guided room covering the deployment of honeypots and analysis of botnet activitiesSep 7
Team Cymru - visibility into global cyber threatsBotnet 7777: Are You Betting on a Compromised Router?A “7777 botnet” was first referenced in public reporting in October 2023 by Gi7w0rm. At the time, it was described as a botnet with…Nov 25
Gi7w0rmThe curious case of the 7777-BotnetHello there and welcome back again to yet another blog post. Today, I am reporting on something I have been investigating for a while now…Oct 19, 20232
Jacob MasseCaught in a Honeypot: Analyzing New-Age Malware, Infection Processes + TechniquesAs malware evolves, organizations and hobbyist individuals with an interest in cybersecurity must keep honeypots active. Honeypots serve as…Sep 17
@cryptaxReverse engineering of Android/PhoenixAndroid/Phoenix is a malicious Remote Access Tool. Its main goal is to extensively spy on the victim’s phone (grab all screenshots, steal…Feb 6
Jacob MasseHacking the Hackers: Taking Down a Live BotnetIt was a Wednesday afternoon when I decided to check the honeypot logs on my VPS. Oh no, a botnet has tried to infect the server! Let’s…Aug 22
DCSO CyTec BlogReporting on Volt Typhoon’s “JDY” Botnet Administration Via Tor Sparks QuestionsNot all Tor relays are created equal. A closer look at network communication between a Volt Typhoon C2 and a Tor relay prompts questions.Jan 30