Insidious Twitter Botnet is Streaming in Stealth Mode

Recently, I became aware of a prodigious stealth-mode Twitter botnet that contain upwards of 3 million user accounts, alongside two other botnets that total 100,000 bots. Kudos goes to SadBotTrue security researchers who first disclosed botnet findings at their blog earlier this week.

Twitter botnet streaming in stealth mode

Stealth Twitter botnet

According to SadBotTrue, this particular botnet is the most active and most undetectable botnet in existence on Twitter today.

SadBotTrue states at their blog:

All the accounts are protected...

Read More

IoT cam spy needs a bottom-up revolution

I cam spy on you—from weaknesses in camera firmware to creepy messages delivered through baby surveillance systems—the Internet of Things (IoT) continues to present countless challenges as it hovers above the crossroad of security and privacy.

cam spy home
Recently I discovered Reddit poster Jenn & Tonic (J&T). Having initially purchased and returned a Netgear Arlo surveillance cam, J&T can now spy on the new owner—via the use of a previously associated Arlo account.

For the purpose of this article:...

Read More

Sphinx: New Zeus Variant for Sale on the Black Market

Republished from the now defunct Norse Corporation blog: May 2015.

The 0Day marketplace was a busy beaver this weekend. I’ve been waiting and watching Sphinx for the past 10 days to see if the 0Day admin would verify this new threat:

Sphinx

New Zeus Variant

On Sunday evening, Sphinx, a new variant of the Zeus banking trojan was admin-verified. Sphinx is coded in C++ and based on ZeuS source code and operates fully through the Tor network using a Tor hidden service...

Read More

Down the Darknet Rabbit Hole Again

Darknet rabbit hole

Author note: This originally appeared at the defunct Norse Darkmatters blog during the summer of 2015: Exploring the Dark Recesses of the Deepweb (with minor edits).

. . .

Darknet Rabbit Hole

I’ve been back down the rabbit hole, into the Darknet again and it’s been a hell of a hostile and discordant excursion this time. For those of us who are merely researching the cybercriminal ecosystem, it can become an extremely precarious place to visit sometimes.

I’ve had noxious miscreants jabbering...

Read More