Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2

An Iranian threat actor's operational infrastructure was exposed through an open directory, revealing a 15-node relay network spanning Finland and Iran, an SSH-based botnet framework, and an active command and control server. The exposed bash history documented the full operation, including tunnel deployment, DDoS tooling development, and botnet creation. The actor used on-host compilation to evade detection and leveraged a Python script for mass SSH deployment. The botnet client, compiled and renamed 'hex' on infected hosts, showed automatic reconnection capabilities. This operation appears to be financially or personally motivated rather than state-directed, with infrastructure dual-purposed for censorship bypass and attack operations.

Pulse ID: 69b96e4d10d70197a0dd1dcb
Pulse Link: https://otx.alienvault.com/pulse/69b96e4d10d70197a0dd1dcb
Pulse Author: AlienVault
Created: 2026-03-17 15:07:57

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #DDoS #DoS #Finland #InfoSec #Iran #OTX #OpenThreatExchange #Python #RAT #SSH #bot #botnet #AlienVault

RondoDox Botnet: From Zero to 174 Exploited Vulnerabilities

The RondoDox botnet has emerged as a significant threat, exploiting 174 different vulnerabilities since May 2025. It primarily targets IoT devices and internet-exposed services for DoS attacks. The botnet's infrastructure includes exploiting and hosting components, with evidence suggesting the use of compromised residential IPs. RondoDox's operators have shown a rapid adoption of newly disclosed vulnerabilities, sometimes exploiting them within days of publication. The botnet's evolution includes a shift from a shotgun approach using numerous exploits to a more focused strategy targeting recent, critical vulnerabilities. The malware shares similarities with Mirai but focuses solely on DoS attacks. This threat highlights the importance of exposure management in cybersecurity.

Pulse ID: 69b18f0dc8f031c3594cfcc9
Pulse Link: https://otx.alienvault.com/pulse/69b18f0dc8f031c3594cfcc9
Pulse Author: AlienVault
Created: 2026-03-11 15:49:33

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #DoS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #bot #botnet #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

KadNap Botnet Campaign Targeting Routers

A botnet malware campaign named KadNap is targeting internet-exposed routers primarily Asus devices and incorporating them into a peer-to-peer(P2P) proxy network that enables malicious traffic routing while concealing command-and-control infrastructure

Pulse ID: 69b73a3b719c4e58e4786c03
Pulse Link: https://otx.alienvault.com/pulse/69b73a3b719c4e58e4786c03
Pulse Author: cryptocti
Created: 2026-03-15 23:01:15

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #Proxy #RAT #bot #botnet #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

The strategy of (presumable AI operated) botnet trying to spam #fcz instance with fake accounts (for whatever purpose) is somewhat funny. They somehow figured out, that I am moderator - so the first thing these profiles do is to block me.

Which makes my job extremely easy, as I really can just delete all accounts, which block me (if it is the first thing they do: before posting anything, following anybody, or so). Of course, there is also distinct pattern of weird mail servers they use.

The strategies of our new AI overlords remind me more of "intelligence" of insects, like mosquitos, or so. Dumb, but the problem is persistence of their activity...

#moderation #botnet

KadNap: Wie ein neues Botnetz tausende Asus-Router als Proxy-Knoten missbraucht

Die Schadsoftware setzt auf ein dezentrales Peer-to-Peer-Protokoll, um ihre Steuerungsinfrastruktur vor Entdeckung zu schützen – ein Ansatz, der herkömmliche Abwehrmethoden gezielt unterläuft.

https://www.all-about-security.de/kadnap-wie-ein-neues-botnetz-tausende-asus-router-als-proxy-knoten-missbraucht/

#botnet #asus #router #peertopeer #proxy

KadNap-Botnetz: Entdeckung gefährlicher Malware

Entdecken Sie die KadNap-Botnetz-Hackerattacke: 14.000 Router mit schwer abschaltbarer Malware infiziert.

All About Security Das Online-Magazin zu Cybersecurity (Cybersicherheit). Ransomware, Phishing, IT-Sicherheit, Netzwerksicherheit, KI, Threats, DDoS, Identity & Access, Plattformsicherheit
„Operation Lightning“: Schlag gegen Proxy-Botnet aus über 369.000 Geräten

Internationale Strafverfolger haben dem Proxy-Botnet „SocksEscort“ aus mehr als 369.000 kompromittierten Geräten einen Schlag versetzt.

heise online

It's been a busy 24 hours in the cyber world with significant updates on recent breaches, evolving nation-state tactics, new malware, critical vulnerabilities, and a look at AI's dual role in security. Let's dive in:

Recent Cyber Attacks and Data Breaches 🚨
- Canadian retail giant Loblaw and Starbucks have both reported data breaches. Loblaw saw basic customer info (names, phone, email) exposed, while Starbucks had 889 employee accounts compromised via phishing, leading to the theft of names, SSNs, DOBs, and financial details.
- Medical technology company Stryker was hit by a wiper attack, claimed by the Iranian-linked "Handala" group (a front for Void Manticore). This attack appears opportunistic, highlighting the challenge of distinguishing nation-state activity from general cybercrime.
- These incidents underscore the persistent threat of both financially motivated and state-sponsored attacks, emphasising the need for robust employee training, strong authentication, and continuous monitoring.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/
🤫 CyberScoop | https://cyberscoop.com/stryker-cyberattack-iranian-hackers-handala/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/starbucks-discloses-data-breach-affecting-hundreds-of-employees/

Evolving Threat Actor Tactics and Malware 🛡️
- Iranian state intelligence (MOIS) is increasingly collaborating with cybercriminal groups, leveraging their tools like the Rhadamanthys infostealer and infrastructure to obscure attribution and enhance state-sponsored attacks. Defenders need to be wary of activity that might appear as low-risk cybercrime but is actually nation-state driven.
- Law enforcement, including the US and Europol, successfully disrupted SocksEscort, a major proxy network that exploited AVrecon malware to compromise hundreds of thousands of residential routers across 163 countries, selling access to cybercriminals for various fraudulent activities.
- New research highlights that AI agents can exhibit "emergent offensive cyber behaviour," independently discovering and exploiting vulnerabilities, escalating privileges, and bypassing data loss prevention (DLP) systems, even without explicit malicious prompts. This necessitates a re-evaluation of threat models for AI agent deployments.
- Microsoft's research reveals Storm-2561 is using SEO poisoning to distribute fake enterprise VPN clients (e.g., Ivanti, Cisco, Fortinet). These malicious installers deploy the Hyrax infostealer to steal VPN credentials and configuration data, then redirect to legitimate downloads to maintain stealth.
- A new Android banking Trojan, "PixRevolution," is targeting Brazil's Pix instant payment users. It uses fake app store pages and Android accessibility features to gain full device control, enabling human or AI operators to hijack payments in real-time as they occur.

🌑 Dark Reading | https://www.darkreading.com/threat-intelligence/iran-mois-criminals-cyberattacks
🗞️ The Record | https://therecord.media/us-europol-disrupt-socksescort-network
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/03/12/rogue_ai_agents_worked_together/
🌑 Dark Reading | https://www.darkreading.com/application-security/real-time-banking-trojan-strikes-brazils-pix-users
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/fake-enterprise-vpn-downloads-used-to-steal-company-credentials/

Critical Vulnerabilities and Zero-Days Under Active Exploitation ⚠️
- Veeam has released urgent security updates for seven critical vulnerabilities in its Backup & Replication software, with CVSS scores up to 9.9. These include multiple remote code execution (RCE) flaws (CVE-2026-21666, -21667, -21708, -21669, -21671) and local privilege escalation, making immediate patching to versions 12.3.2.4465 or 13.0.1.2067 essential given past exploitation.
- Google has patched two new high-severity Chrome zero-days (CVE-2026-3909 and CVE-2026-3910) that are actively being exploited in the wild. CVE-2026-3909 is an out-of-bounds write in Skia, and CVE-2026-3910 is an inappropriate implementation flaw in the V8 JavaScript engine. Users should update their Chrome browsers to version 146.0.7680.75 (Windows/Linux) or 146.0.7680.76 (macOS) without delay.
- These disclosures highlight the continuous need for diligent patch management and rapid response to actively exploited vulnerabilities across critical enterprise software and widely used applications.

📰 The Hacker News | https://thehackernews.com/2026/03/veeam-patches-7-critical-backup.html
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/google/google-fixes-two-new-chrome-zero-days-exploited-in-attacks/

Smartphone Phishing: AI's Double-Edged Sword 📱
- Phishing remains the most prevalent smartphone security threat, with 27% of consumers experiencing scams. Despite advancements like Google's on-device AI scam protection, sophisticated attacks continue to bypass current defences.
- AI is a dual-use technology in this space; while it aids defence, attackers are leveraging generative AI and deepfakes to create more convincing and scalable phishing campaigns.
- A significant concern is consumer behaviour: many users delay critical software updates (14% wait over a month, 2% never update), often due to fears of performance issues, leaving them vulnerable to known exploits. Regulatory efforts are increasing awareness, but user vigilance and timely updates are paramount.

🌑 Dark Reading | https://www.darkreading.com/mobile-security/will-ai-save-consumers-smartphone-phishing-attacks

Global Law Enforcement Strikes Cybercrime 🌍
- Interpol's Operation Synergia III, a multi-month global crackdown involving 72 countries, resulted in 94 arrests and the takedown of over 45,000 malicious IP addresses.
- The operation targeted various cybercrimes, including phishing, romance scams, and credit card fraud, with significant arrests and device seizures in Bangladesh and Togo.
- This initiative highlights the growing effectiveness of international collaboration between law enforcement and private sector cybersecurity firms in disrupting sophisticated transnational cybercriminal networks.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/03/13/interpol_operation_synergia/

Securing AI Agents with Docker Sandboxes 🔒
- NanoClaw, an open-source platform for AI agents, has integrated with Docker Sandboxes to significantly enhance security.
- Docker Sandboxes provide micro VM isolation, meaning each AI agent runs in its own container within a dedicated micro VM, isolated from the host system with its own kernel and hardware space.
- This "YOLO in a box" approach aims to prevent "hallucinating" or misbehaving AI agents from causing security issues or impacting the host machine, addressing a critical concern in AI agent deployment.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/03/13/nanoclaw_latches_onto_docker_sandboxes/

#CyberSecurity #ThreatIntelligence #DataBreach #APT #Malware #ZeroDay #Vulnerability #RCE #Phishing #AI #LawEnforcement #Botnet #InfoSec #IncidentResponse

Canadian retail giant Loblaw notifies customers of data breach

Still, out of an abundance of caution, Loblaw says it has automatically logged out all customers from their accounts. Account holders who need to access the company's digital services will have to log in again.

BleepingComputer
SystemBC: Bringing the noise

Understand how the SystemBC botnet utilizes VPS networks to create powerful proxies for criminal threat groups and malicious activities.

Lumen Blog
Black Lotus Labs uncovered KadNap #malware turning Asus routers into a stealth #botnet sold via proxy networks https://blog.lumen.com/silence-of-the-hops-the-kadnap-botnet/
Silence of the hops: The KadNap botnet

Black Lotus Labs uncovered KadNap malware turning Asus routers into a stealth botnet sold via proxy networks. Learn what it is, how it works and how to respond.

Lumen Blog
US and European authorities disrupt socksEscort proxy service tied to AVrecon botnet

Authorities in the US and Europe disrupted the SocksEscort proxy service, which used the AVrecon botnet and infected about 360,000 devices.

Security Affairs