后门木马
Search documents
国家网络安全通报中心提示:重点防范境外恶意网址和恶意IP
Zhong Guo Xin Wen Wang· 2026-01-20 06:25
Core Viewpoint - The National Cybersecurity Incident Response Center of China has identified a series of malicious websites and IP addresses linked to foreign hacker organizations that pose significant threats to Chinese and other countries' networks and internet users [1]. Group 1: Malicious Address Information - Malicious Address: telnet.icealeximino.live, IP: 51.81.255.132, Location: USA/Oregon/Portland, Threat Type: Botnet, Virus Family: V3G4Bot, Description: A variant of the Mirai botnet targeting Linux and IoT devices, capable of launching DDoS attacks [1]. - Malicious Address: nj5056ja.duckdns.org, IP: 104.250.167.52, Location: Canada/Quebec/Montreal, Threat Type: Backdoor, Virus Family: NjRAT, Description: A remote access trojan with capabilities for screen monitoring, keylogging, and data theft [2]. - Malicious Address: dinero26.duckdns.org, IP: 192.159.99.171, Location: UK/England/London, Threat Type: Backdoor, Virus Family: RemCos, Description: A remote management tool that can execute various malicious activities including keylogging and password theft [3]. - Malicious Address: coomm.servebbs.net, IP: 185.196.20.150, Location: Germany/Bavaria/Nuremberg, Threat Type: Backdoor, Virus Family: AsyncRAT, Description: A backdoor trojan with functionalities for screen monitoring and file theft [4]. - Malicious Address: sedef3.duckdns.org, IP: 188.89.182.68, Location: Netherlands, Threat Type: Backdoor, Virus Family: Xworm, Description: A .NET compiled backdoor with extensive malicious control features [5]. - Malicious Address: 103.136.41.159, Location: Netherlands/South Holland/Nardewijk, Threat Type: Botnet, Virus Family: Mirai, Description: A Linux botnet virus capable of launching DDoS attacks [6]. - Malicious Address: 151.243.109.160, Location: Netherlands/North Brabant/Eindhoven, Threat Type: Botnet, Virus Family: Gafgyt, Description: An IoT botnet virus that can attack network devices and launch DDoS attacks [7]. - Malicious Address: xerecanega.ddns.net, IP: 186.192.123.40, Location: Brazil/Goiás/Goianésia, Threat Type: Backdoor, Virus Family: NjRAT, Description: Similar to previous NjRAT instances, capable of extensive remote control [10]. - Malicious Address: cvawrs.duckdns.org, IP: 160.187.246.23, Location: Vietnam/Thanh Hoa, Threat Type: Botnet, Virus Family: SoftBot, Description: A botnet capable of launching various forms of DDoS attacks [11]. Group 2: Detection and Response Methods - Method 1: Analyze browser records and recent traffic to identify connections to the listed malicious addresses, extracting source IP and device information for further analysis [12]. - Method 2: Deploy network traffic detection devices to analyze flow data and track activities related to the identified malicious websites and IPs [12]. - Method 3: Report incidents to law enforcement and cooperate in on-site investigations and technical tracing [14].