Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Zergeca Botnet: The Cyber Menace That Won’t Take a Day Off
Cybersecurity researchers have identified a new botnet, Zergeca, capable of DDoS attacks. Written in Golang, it boasts features like proxying, self-upgrading, and reverse shell. Notably, it uses DNS-over-HTTPS to cloak its command-and-control servers.
Hot Take:
Looks like the botnet world just got a new MVP with Zergeca. If Mirai was the Michael Jordan of DDoS, Zergeca is the LeBron James—or maybe the Steph Curry, given its flashy new tricks!
Key Points:
- New botnet Zergeca, written in Golang, has been discovered by cybersecurity researchers.
- Zergeca can perform six different DDoS attack methods and has additional capabilities like proxying, scanning, and reverse shell.
- Utilizes DNS-over-HTTPS (DoH) for C2 resolution and lesser-known Smux library for communications.
- Evidence suggests creators previously operated Mirai botnets.
- Targets include Canada, Germany, and the U.S.; features modules for persistence, proxy, silivaccine, and zombie functionalities.