PaloAlto researchers discovered SquirtDanger, a malware family likely developed by the Russian cybercriminal known as ‘TheBottle’.
Discovered in 2018 by Radware researchers, JenX is a botnet that advertises the ability to perform the query floods, attacks against NFO gaming servers, attacks against OVH, and attacks against TeamSpeak3 (TS3), an app used for voice and text chat. JenX also boasts the ability to perform DDoS attacks that reach over 1 terabyte per second (Tbps).
Smominru is a botnet that, at the time of writing, is mostly comprised of over 526,000 Windows computers, which are primarily Windows servers. Although it has been observed delivering a variety of malware to vulnerable system such as Mirai DDoS malware and other trojans, its primary function is to generate profit for its operator(s) by mining cryptocurrency on infected systems.
Researchers at NewSky Security discovered Masuta, a malware family developed from the source code of Mirai and likely developed by the creator of Satori known as "Nexus Zeta." From Masuta, a second version was created, dubbed PureMasuta, which leverages a flaw in the HNAP protocol in D-Link routers that was originally identified in 2015.
F5 threat researchers discovered a new cryptocurrency-mining malware targeting Linux systems via the SSH protocol. This malware is written in the Python scripting language and is designed to infect systems and join them together in a botnet, dubbed PyCryptoMiner, for the purpose of mining Monero cryptocurrency.
WireX is a large botnet that leverages Android-powered mobile devices to perform distributed denial-of-service (DDoS) attacks on targets. Network traffic generated by WireX was discovered by researchers on August 2, 2017 and the source of the malware infections that formed the botnet was traced to approximately 300 mobile apps available for download on the Google Play Store.