Workflow
僵尸网络
icon
Search documents
绿盟科技:2025版Botnet趋势报告
Sou Hu Cai Jing· 2025-04-11 04:35
Group 1 - The core viewpoint of the report is that botnets are increasingly being used as tools in geopolitical conflicts, impacting critical infrastructure and influencing public opinion [16][22][25] - Botnets are evolving into weapons for state-level cyber warfare, with significant DDoS attacks observed during major geopolitical events such as the Russia-Ukraine war and the Israel-Palestine conflict [16][22] - The report highlights that botnets are being utilized by advanced persistent threat (APT) groups and ransomware gangs for intelligence gathering and launching subsequent attacks [17][39] Group 2 - The report indicates that the Mirai botnet family is the most active, with a significant number of command and control (C&C) servers located in the United States [67][68] - The infection methods for botnets include exploiting vulnerabilities in Linux/IoT platforms and using phishing emails for Windows platforms, with the U.S. having the highest number of infected devices [51][58] - The report notes that botnets are increasingly employing advanced evasion techniques to avoid detection, such as using Domain Generation Algorithms (DGA) and DNS over HTTPS (DoH) [2][17] Group 3 - New botnet families are emerging, showcasing unique functionalities and communication patterns, which pose increasing threats to cybersecurity [3][67] - Active botnet groups like Hail and KekSec are frequently launching attacks, while new groups like Bigpanzi are also contributing to the evolving threat landscape [4][3] - The report predicts that botnets will be used more efficiently by APT and ransomware groups for profit-driven activities, with enhanced stealth in their propagation methods [4][16]
Botnet趋势报告(2025版)
Lv Meng Ke Ji· 2025-04-10 01:55
Investment Rating - The report does not explicitly state an investment rating for the industry or specific companies. Core Insights - The report highlights the increasing significance of botnets as tools for geopolitical conflict, particularly in the context of recent global events such as the Russia-Ukraine war and the Israel-Palestine conflict, where botnets have been used for DDoS attacks against critical infrastructure [14][18]. - The report indicates that the threat landscape posed by botnets is escalating, with a notable increase in the number of command and control (C&C) servers and attack activities, particularly targeting domestic critical infrastructure [14][15]. - Botnets are increasingly being utilized as a launchpad for advanced persistent threats (APTs) and ransomware groups, enhancing their operational efficiency by gathering intelligence and facilitating subsequent attacks [15][43]. Summary by Sections Executive Summary - In 2024, the global landscape is marked by turmoil and challenges, with the cyber domain becoming a battleground for major powers, where botnets play a crucial role in state-sponsored cyber operations [14]. - Botnets have been observed to execute high-intensity DDoS attacks against critical infrastructure, manipulate public opinion, and express political stances during significant geopolitical events [14][15]. Botnet Development Trends - Botnets have evolved into essential tools for state-level cyber warfare, with their operational capabilities being leveraged for both offensive and defensive strategies in the digital realm [18]. - The report notes that the Mirai botnet family remains the most active, with the Mozi malware continuing to spread at high levels, primarily exploiting vulnerabilities in Linux/IoT platforms [14][15]. Botnet Vulnerability and Propagation - The report identifies that Linux/IoT botnets primarily exploit outdated vulnerabilities and weak passwords for propagation, while Windows platforms are more susceptible to phishing and social engineering tactics [59][67]. - The geographical distribution of infected devices shows that the United States has the highest number of infected endpoints, followed by India, Russia, and Brazil [70][71]. Botnet Attack Activity Analysis - The Mirai botnet family is responsible for the majority of attack commands issued, with a significant spike in activity noted in September 2024 [80]. - China is reported to be the most targeted country for DDoS attacks, accounting for 34% of all recorded incidents, necessitating enhanced protection for critical infrastructure [80].