Botnet

This revision is from 2024/10/18 17:45. You can Restore it.

Each client bot polls their IP address and port to the central bot.

The client bot gets the current list of scammers.

~

The central bot can issue the command to all the client bots (to flood the server).

https://github.com/topics/ddos-attack-tools?l=c

The top 10 botnets currently...

  • Gafgyt: Gafgyt botnet made up more than half of the 2.8 million DDoS attacks tracked by NetScout in 1H 2021. It grew by 3.9 times in 2019, with a 34.5% increase in C&C servers.
  • Mirai: Mirai botnet, along with Gafgyt, made up more than half of the 2.8 million DDoS attacks tracked by NetScout in 1H 2021.
  • Fancy Lazarus: Fancy Lazarus DDoS extortion campaign kicked into high gear in 1H 2021, threatening organizations in multiple industries with a focus on ISPs and their authoritative DNS servers.
  • Gorilla Botnet: Gorilla Botnet launched over 300,000 DDoS attacks across 100 countries, targeting universities, government websites, telecoms, banks, gaming, and gambling sectors.
  • Emotet: Emotet botnet is still active, with a significant number of C&C servers hosted in the LatAm region.
  • TrickBot: TrickBot botnet is still active, with a significant number of C&C servers hosted in the LatAm region.
  • Zeus: Zeus botnet is still active, with a significant number of C&C servers hosted in the LatAm region.
  • Ryuk: Ryuk botnet is still active, with a significant number of C&C servers hosted in the LatAm region.
  • Qbot: Qbot botnet is still active, with a significant number of C&C servers hosted in the LatAm region.
  • Ramnit: Ramnit botnet is still active, with a significant number of C&C servers hosted in the LatAm region.
  

📝 📜 ⏱️ ⬆️