abuse.ch :verified:
abuse.ch :verified:abuse_ch@ioc.exchange
2026-01-16

Brazilian banker ๐Ÿ‡ง๐Ÿ‡ท

GHOST panel ๐Ÿง

007consultoriafinanceira .net โžก๏ธ GoDaddy ๐Ÿ‡บ๐Ÿ‡ธ
83.229.17.124:80 โžก๏ธ Clouvider ๐Ÿ‡บ๐Ÿ‡ธ

Payload delivery URL ๐ŸŒ:
urlhaus.abuse.ch/url/3759148/

Malware sample (MSI) โš™๏ธ:
bazaar.abuse.ch/sample/2cbafc6

Brazilian Banker "GHOST" panel
abuse.ch :verified: boosted:
The Spamhaus Projectspamhaus@infosec.exchange
2026-01-14

๐Ÿค– Jul-Dec 2025 Botnet Threat Update out now!

โฌ†๏ธ 21,425 #botnet C&Cs observed, up by +24%.
โซ Botnet C&C domains soar +9,608% for ๐Ÿ‡ท๐Ÿ‡บ Russia-based REGRU
โฌ†๏ธ Remote Access Trojans represent 42% of Top 20 malware associated with botnet C&Cs.

But it isnโ€™t all bad news โ€“ several large cloud network operators have taken action to tackle active botnet C&Cs - find out which ones in the latest FREE report here๐Ÿ‘‡
spamhaus.org/resource-hub/botn

#Botnet #ThreatIntel

abuse.ch :verified:abuse_ch@ioc.exchange
2026-01-06

Malspam sent from Microsoft Outlook that is spreading #LogMeIn GoToResolve RMM, enabling threat actors to access the victim's machine from remote ๐Ÿ’ป๐Ÿ”๐Ÿ•ต๏ธ

IOCs:
๐Ÿ“ก adwestmailcenter .com โžก๏ธ Landing page
๐Ÿ“ก insightme .im โžก๏ธ fake PDF download

Payload hosted on Cloudflare R2 bucket, but already got nuked due to an abuse report from URLhaus ๐Ÿ™Œ
urlhaus.abuse.ch/url/3751500/

LogMeIn #GoToResolve payload ๐Ÿ“„
bazaar.abuse.ch/sample/77e22f4

Malspam from Microsoft Outlook spreading LogMeIn GoToResolve RMMFake PDF download spreading LogMeIn GoToResolve RMM
abuse.ch :verified:abuse_ch@ioc.exchange
2025-12-23

CHICXULUB IMPACT ๐Ÿ’ฅ

Botnet C2 URLs:
๐Ÿ“ก https://turbokent .name/api/initialize
๐Ÿ“ก https://turbokent .name/api/status

Sponsoring domain registrar: NICENIC ๐Ÿ‡ญ๐Ÿ‡ฐ

Malware sample ๐Ÿ“„:
bazaar.abuse.ch/sample/c32e1db

turbokent .name - CHICXULUB IMPACT
abuse.ch :verified:abuse_ch@ioc.exchange
2025-12-18

New Stealer in town: SantaStealer ๐ŸŽ…๐ŸŽ„

Botnet C2s โžก๏ธall hosted at AS399486 VIRTUO ๐Ÿ‡จ๐Ÿ‡ฆ:

๐Ÿ“ก31.57.38.119:6767
๐Ÿ“ก31.57.38.244:6767
๐Ÿ“ก80.76.49.114:6767

Stealer admin panel (via @DarkWebInformer ๐Ÿ’ช):
๐Ÿ•ต๏ธ stealer. su

Artifacts ๐Ÿ’ป:
C:\tempLog\Clipboard.txt
%LocalAppData%\Temp\passwordslog.txt

Malware samples ๐Ÿค–:
bazaar.abuse.ch/browse/tag/San

IOCs available on ThreatFox ๐ŸฆŠ:
threatfox.abuse.ch/browse/tag/

SantaStealer botnet C2 traffic
abuse.ch :verified:abuse_ch@ioc.exchange
2025-12-16

Love letter โค๏ธ from a threat actor ๐Ÿ•ต๏ธexploiting React2Shell vulnerability (CVE-2025-55182) to spread #Mirai malware โคต๏ธ

fuckoffurlhaus ๐Ÿ˜‚

Payload URLs ๐ŸŒ:
urlhaus.abuse.ch/host/45.153.3

Mirai botnet C2s ๐Ÿ“ก:
marvisxoxo .st (ISTanCo ๐Ÿ‡ท๐Ÿ‡ธ)
45.156.87 .231:23789 (AS51396 PFCLOUD ๐Ÿ‡ฉ๐Ÿ‡ช)

Malware sample ๐Ÿ“„:
bazaar.abuse.ch/sample/9a84057

Mirai malware delivery URLs
abuse.ch :verified:abuse_ch@ioc.exchange
2025-12-15

Unknown malware using WebSockets for botnet command&control, spreading through #ClickFix โคต๏ธ

๐Ÿ–ฑ๏ธClickFix -> ๐Ÿ“ƒVBS -> โš™๏ธMSI

Payload delivery host:
๐ŸŒ urlhaus.abuse.ch/host/103.27.1

Malware sample ๐Ÿค–:
bazaar.abuse.ch/sample/4d8e5e8

Botnet C2 domains:
๐Ÿ“ก w2li .xyz
๐Ÿ“ก w2socks .xyz

The same malware is also being spread by #Amadey pay-per-install (PPI):
โžก๏ธ urlhaus.abuse.ch/url/3733103/

ClickFix infection chain
abuse.ch :verified:abuse_ch@ioc.exchange
2025-12-10

Exploitation of recent React RCE vul (CVE-2025-55182 - #React2Shell) leading to #Mirai infection โคต๏ธ

Botnet Mirai C2 domains ๐Ÿ“ก:
effeminate.fuckphillipthegerman .ru
trap.fuckphillipthegerman .ru
tranny.fuckphillipthegerman .ru

Botnet Mirai C2 servers , all hosted at FORTIS ๐Ÿ‡ท๐Ÿ‡บ:
138.124.72.251:52896
138.124.69.154:60328
5.144.176.19:60328

Mirai #malware sample ๐Ÿค–:
bazaar.abuse.ch/sample/ee2fe11

Payload delivery host ๐ŸŒ:
urlhaus.abuse.ch/host/172.237.

Releated IOCs ๐ŸฆŠ:
threatfox.abuse.ch/browse/tag/

Malicious bash script delivering Mirai payload
abuse.ch :verified:abuse_ch@ioc.exchange
2025-12-08

MaksRAT

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\javacom

Botnet C2s ๐Ÿ“ก
104.198.24 .41:6656
avocado .gay
www.foldacces .online
www.makslove .xyz
www.mavenrat .xyz
www.blackprofit .online

Malware sample ๐Ÿค–
bazaar.abuse.ch/sample/883108e

IOCs are available on ThreatFox ๐ŸฆŠ
threatfox.abuse.ch/browse/tag/

MaksRAT botnet C2 traffic
abuse.ch :verified:abuse_ch@ioc.exchange
2025-12-05

Mirai campaign spreading through 213.209.143.85 (Railnet ๐Ÿ‡ณ๐Ÿ‡ฑ), messing around with the victim's system iptables ๐Ÿค”

Mirai botnet C2 domain:
womp.datasurge .vip (NameCheap ๐Ÿ‡บ๐Ÿ‡ธ)

Mirai botnet C2 server:
176.65.148.57:6969 (Pfcloud ๐Ÿ‡ฉ๐Ÿ‡ช)

Payload URL:
๐ŸŒ urlhaus.abuse.ch/url/3725743/

Mirai malware sample:
๐Ÿค– bazaar.abuse.ch/sample/1124814

More #Mirai IOCs are available on ThreatFox:
๐ŸฆŠ threatfox.abuse.ch/browse/malw

abuse.ch :verified:abuse_ch@ioc.exchange
2025-12-04

Mirai botnet #zerobot spreading through 172.86.123.179 (cloudzy ๐Ÿ‡ฆ๐Ÿ‡ช) โคต๏ธ

Mirai botnet C2 domain:
0bot.qzz .io (Gandi SAS ๐Ÿ‡ซ๐Ÿ‡ท)

Mirai botnet C2 server:
140.233.190.96:69 (Internet Magnate ๐Ÿ‡ฟ๐Ÿ‡ฆ)

Payload URLs:
๐ŸŒ urlhaus.abuse.ch/host/172.86.1

Mirai malware sample:
๐Ÿค– bazaar.abuse.ch/sample/9f64ea4

More #Mirai IOCs are available on ThreatFox:
๐ŸฆŠ threatfox.abuse.ch/browse/malw

Mirai bot "zerobot"
abuse.ch :verified:abuse_ch@ioc.exchange
2025-12-03

๐ŸŽ‰ Massive shout out to URLhaus Top Contributor โ€œgeenenspโ€

First seen April 13th 2020 and since then, theyโ€™ve shared an unbelievable 844,345 malware URLs!! ๐Ÿ˜ฎ Over the last 30 days, they have shared 8,902 URLs, firmly securing their position at the top of the leaderboard ๐Ÿ’ช

URLhaus simply wouldn't exist without the help of awesome contributors like this who report malware URLs everyday ๐Ÿ™

URLhaus โžก๏ธ urlhaus.abuse.ch/
Stats โžก๏ธ urlhaus.abuse.ch/statistics/

Top Contributor URLhaus - Geenensp
abuse.ch :verified:abuse_ch@ioc.exchange
2025-11-27

๐Ÿ” has OCR capabilities for screenshots obtained via CDP, which are used to extract text from captcha
๐Ÿค– uses a Grok LLM model that resides in the botnet C2 server to solve the captcha

Botnet C2 servers are all hosted at Hetzner ๐Ÿ‡ฉ๐Ÿ‡ช on port 8008 TCP:
46[.]62.225.51 [active]
46[.]62.224.205
46[.]62.205.38

GrokPy malware samples on MalwareBazaar:
๐Ÿ“„ bazaar.abuse.ch/browse/signatu

Botnet C2s on ThreatFox:
๐ŸฆŠ threatfox.abuse.ch/browse/tag/

GrokPy botnet C2 traffic
abuse.ch :verified:abuse_ch@ioc.exchange
2025-11-27

โš™๏ธ uses the CDP (Chrome developer protocol) of either Edge or Chrome installed on the victim machine for further malicious actions
๐Ÿ“ก calls back to the botnet C2 on the various stages of the infection and the results of its malicious actions
๐Ÿ‘ฑ creates new accounts on Discord to obtain authentication tokens, which are then reported back to the botnet C2
๐Ÿ“ง uses dilly + [a-zA-Z0-9]{8,11}@Gmail
.com + password [a-zA-Z0-9]{8} as the email and password for the Discord registration process

abuse.ch :verified:abuse_ch@ioc.exchange
2025-11-27

Weโ€™ve identified an interesting malware family ๐Ÿ”, which weโ€™ve named #GrokPy due to its use of a Grok LLM model ๐Ÿค– to solve and subsequently bypass CAPTCHAs ๐Ÿ”ฅ

The malware gets dropped by #Amadey and:

๐Ÿช collects information about the infected device, such as screen resolution, public IP & location, ram usage and CPU name
๐Ÿ’ป attempts to escalate privileges by running as admin or as a scheduled task

abuse.ch :verified:abuse_ch@ioc.exchange
2025-11-23

@7666 I recommend you to just remove the PS and serve 404. URLhaus cant distinguish between malicious PS and legitinate PS and as that URL was serving a PS initially, the URL will be flagged as online as long as it servs a PS

abuse.ch :verified:abuse_ch@ioc.exchange
2025-11-23

@7666 URLhaus re-scans every URL several times per hour. No need for a manual rescan

abuse.ch :verified: boosted:
The Spamhaus Projectspamhaus@infosec.exchange
2025-11-20

This week, everywhere you look, bulletproof hosting (BPH) is in cyber news headlines. From the CrazyRDP takedown, to sanctions against entities adjacent to Aeza, and most recently Media Land LLC and ML[.]Cloud] LLC (do these measures actually move the needle?), to new CISA guidance on mitigating BPH activities.๐Ÿ›ก๏ธ

Itโ€™s clear the spotlight is firmly on one of cybercrimeโ€™s most persistent enablers. And for a good reason. Few infrastructures have enabled so much criminal activity, for so long, with such resilience.

Spamhaus has tracked BPH operators and their evolving tactics for decades. ๐Ÿ•ต๏ธ We've watched the ecosystem shift from monolithic BPHs to layered and complex business structures.

So, amid the sensational headlines, weโ€™ve compiled a grounded look at the topic, covering: the history, the current landscape, and where the threat landscape is likely to head next.

Read it in full here ๐Ÿ‘‰ spamhaus.org/resource-hub/bull

#Bulletproofhosting #Cybercrime

The anatomy of bulletproof hosting - past, present, future
abuse.ch :verified:abuse_ch@ioc.exchange
2025-11-20

@spamhaus Taking down the infrastructure is only half the battle, supporting those affected is just as important. Thank you, for stepping in again to help remediate machines infected with the Rhadamanthys malware ๐Ÿ‘๐Ÿ‘ #Community #Endgame3 #Remediation

abuse.ch :verified: boosted:
The Spamhaus Projectspamhaus@infosec.exchange
2025-11-20

ENDGAME 3.0 REMEDIATION | Following on from the ๐Ÿ“ข announcement last week Spamhaus is now sending notification emails ๐Ÿ“ฉ to ISPs associated with infected machines.

Here's what to do if you receive one: โคต๏ธ

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst