New XorDDoS Malware Allows Attackers to Create Sophisticated DDoS Bot Network - Cyber Security News

“We discovered the latest version of the XorDDoS controller, called the ‘VIP version,’ and its corresponding central controller were used to build the DDoS bot network for more sophisticated and widespread attacks,” noted Cisco Talos in their recent analysis. Once inside a system, XorDDoS deploys sophisticated persistence mechanisms, ensuring automatic execution at system startup while effectively evading detection by security products. A significant evolution in distributed denial-of-service (DDoS) malware has been detected, with the latest version of XorDDoS continuing to spread globally between November 2023 and February 2025. This central controller enables threat actors to manage multiple XorDDoS sub-controllers simultaneously, significantly enhancing their ability to coordinate large-scale attacks. The malware primarily propagates through SSH brute-force attacks, attempting numerous root credential combinations across thousands of servers until successfully gaining access to vulnerable Linux devices. Cisco Talos researchers identified that over 70 percent of attacks using XorDDoS targeted the United States during the monitoring period. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The geographic impact extends beyond the United States, with compromised systems attempting to target and attack several countries including Spain, Taiwan, Canada, Japan, Brazil, and numerous European nations.

This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 18 Apr 2025 09:20:12 +0000


Cyber News related to New XorDDoS Malware Allows Attackers to Create Sophisticated DDoS Bot Network - Cyber Security News

9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
New XorDDoS Malware Allows Attackers to Create Sophisticated DDoS Bot Network - Cyber Security News - “We discovered the latest version of the XorDDoS controller, called the ‘VIP version,’ and its corresponding central controller were used to build the DDoS bot network for more sophisticated and widespread attacks,” noted ...
3 months ago Cybersecuritynews.com
Why Bot Management Should Be a Crucial Element of Your Marketing Strategy - Marketing teams need a comprehensive bot management solution to address the challenges posed by bot traffic and protect marketing analytics. Bot management is designed to protect marketing efforts from bot-generated invalid traffic by accurately and ...
1 year ago Imperva.com
Why every company needs a DDoS response plan - Today's DDoS attacks are not what they were even a few years ago, and we continue to see DDoS attacks that are framed as the largest in history. As a result, large organizations need adaptive, multilayered defense capabilities that can respond just ...
1 year ago Helpnetsecurity.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
1 month ago Cybersecuritynews.com
The Rise of DDoS Attacks in Q3, 2023: Are You Prepared? - The Indusface AppSec Q3, 2023 Report reveals a staggering 67% surge in DDoS attacks compared to the previous quarter, highlighting a concerning trend with profound impacts on various industries. Over 41% of websites have shown signs of DDoS attacks ...
1 year ago Cybersecuritynews.com CVE-2023-44487 Cloak
DataDome Expands Bot Bounty Program to the Public, Invites Researchers to Rigorously Test its Solution - PRESS RELEASE. NEW YORK, Feb. 13, 2024 /PRNewswire/ - DataDome, a leading provider of AI-powered online fraud and bot management, today announced it has opened its bot bounty program to the public, in partnership with ethical hacking platform ...
1 year ago Darkreading.com
The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of - Now, these attacks are becoming more dangerous, targeted, and detrimental as they evolve. As DDoS attacks become more sophisticated, adversaries are able to hone in on the most vulnerable targets, ranging from small- and medium-sized businesses to ...
1 year ago Cyberdefensemagazine.com
How to Prepare for DDoS Attacks During Peak Business Times - One common tactic that many security practitioners have witnessed is carrying out distributed denial-of-service attacks during peak business times, when companies are more likely to be short-staffed and caught unawares. While DDoS attacks are a ...
1 year ago Darkreading.com
In Cybersecurity and Fashion, What's Old Is New Again - While distributed denial-of-service attacks and zero-day threats are nothing new in cybersecurity, they're still happening regularly for a simple reason: They work. In early November 2023, OpenAI blamed a DDoS attack for intermittent ChatGPT issues, ...
1 year ago Darkreading.com
Security Series: Protecting the Edge Against DDoS Attacks with a Simplified Integrated Solution - An unprecedented increase in distributed-denial-of-service attacks in recent years has resulted in lost revenue and productivity, increased ransomware costs, and impacted service-level agreements for network operators. According to Zayo Group's ...
1 year ago Feedpress.me
3 Ways to Use Real-Time Intelligence to Defeat Bots - These days, online businesses must grapple with their own version of the replicant dilemma, as they try to make it easy for their human customers to use their sites, while keeping out a new generation of human-like bots. Bots, of course, are hardly a ...
1 year ago Darkreading.com
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
3 months ago Cybersecuritynews.com
Understanding the Escalating Threat of Web DDoS Tsunami Attacks - Whether it's hacktivists conducting cyberwarfare or ransom-seeking criminals targeting vulnerable firms in financial services, retail, energy, or transportation, a new breed of destructive distributed denial of service attack - the Web DDoS Tsunami - ...
1 year ago Cyberdefensemagazine.com
Blind Eagle Hackers Leveraging Google Drive, Dropbox & GitHub To Bypass Security Defenses - After infection, Remcos can capture user credentials by logging keystrokes and stealing stored passwords, modify and delete files to sabotage systems or encrypt data for ransom, establish persistence through scheduled tasks and registry modifications ...
4 months ago Cybersecuritynews.com CVE-2024-43451 APT-C-36
The Invisible Storm: Why Cloud Malware Is Your Business's New WeatherEmergency - Protecting your business from cloud malware requires a fundamental shift in security thinking, as traditional defenses simply weren’t designed for these sophisticated airborne threats. Recent research by Cloud Storage Security identified ...
3 months ago Cybersecuritynews.com
VPN to protect against DDoS attacks on Twitch - Swarming or DDoS attacks pose a threat to streamers. Your data goes through a secure server, making it harder for attackers to target your actual IP address. A distributed denial-of-service attack globally harasses and attacks legitimate users and ...
1 year ago Itsecurityguru.org
CAPE from Cuckoo v1 - Malware Sandbox to Execute Malicious Files in An Isolated Environment - This approach enables CAPE to force malware samples to fully detonate even when they attempt to detect and evade analysis environments, providing security researchers with complete behavioral insights. Originally developed by Kevin O’Reilly at ...
4 months ago Cybersecuritynews.com
How to Prevent DNS Attacks: DNS Security Best Practices - To protect against attack, best practices must be applied to protect the DNS protocol, the server on which the DNS protocol runs, and all access to the DNS processes. Implementing these best practices will not only protect DNS but also network ...
1 year ago Esecurityplanet.com
PixPirate: The Brazilian financial malware you can't see, part one - The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan malware that heavily utilizes anti-research techniques. Within IBM Trusteer, we saw several different ...
1 year ago Securityintelligence.com
Essential DDoS statistics for understanding attack impact - The impact of DDoS attacks extends far beyond mere inconvenience, as they can result in financial losses, compromised data, and erosion of customer trust. Understanding the nature and consequences of DDoS activity is essential for organizations and ...
1 year ago Helpnetsecurity.com
Types of Malware and How To Prevent Them - Malware is one of the biggest security threats to any type of technological device, and each type of malware uses unique tactics for successful invasions. Even if you've downloaded a VPN for internet browsing, our in-depth guide discusses the 14 ...
1 year ago Pandasecurity.com
State-Sponsored Hacktivism Attacks on The Rise, Rewrites Cyber Threat Landscape - Cyber Security News - “What makes this campaign particularly concerning is how it combines living-off-the-land techniques with sophisticated custom code designed to operate with minimal detection footprint,” explained Maria Sanchez, Principal Threat Researcher ...
3 months ago Cybersecuritynews.com
Keymous+ Hacker Group Claims 700+ DDoS Attacks Around The Globe - The group’s attack strategy demonstrates a concerning lack of ideological consistency, targeting diverse sectors including government websites, telecommunications providers, financial platforms, educational institutions, and manufacturing ...
1 month ago Cybersecuritynews.com
New Chimera Malware That Outsmarts Antivirus, Firewalls, & Humans - This advanced malware first appeared in March 2025 when it infiltrated X Business, a small e-commerce company specializing in handmade home décor, through what appeared to be a routine software update to their inventory management system. This code ...
3 months ago Cybersecuritynews.com Chimera