Skip to content

New Mirai-Based 'Gayfemboy' Botnet Launches Widespread DDoS Attacks

A new Mirai-based botnet is wreaking havoc with DDoS attacks. Using zero-day exploits, it's infecting systems worldwide and poses a significant threat.

In this image, we can see an advertisement contains robots and some text.
In this image, we can see an advertisement contains robots and some text.

New Mirai-Based 'Gayfemboy' Botnet Launches Widespread DDoS Attacks

A new Mirai-based botnet, dubbed 'gayfemboy', has been discovered exploiting zero-day vulnerabilities to spread rapidly. Since February 2024, it has been launching DDoS attacks, with peak activity in late 2023.

The 'gayfemboy' botnet employs more than 20 vulnerabilities and weak Telnet passwords to infect systems. It has targeted hundreds of victims daily across various sectors in China, the US, Germany, the UK, and Singapore. Researchers have observed around 15,000 active IPs, predominantly located in China, Russia, the US, Iran, and Turkey.

The botnet exploits a zero-day bug in Four-Faith industrial routers (CVE-2024-12856) and previously unseen vulnerabilities in Neterbit routers and Vimar smart home devices. It incorporates n-day and zero-day vulnerability exploitation to aid its expansion. Most active IP addresses belong to Vietnam.

Researchers from XLab discovered the botnet but were forced to stop resolving its command-and-control (C2) domain name due to lack of DDoS mitigation service. After registering C2 domain names for analysis, the botnet herders targeted the researchers' VPS.

The 'gayfemboy' botnet poses a significant threat due to its use of zero-day exploits and rapid expansion. With peak activity in late 2023 and ongoing DDoS attacks since February 2024, it has targeted a wide range of sectors and regions. Further research and mitigation efforts are needed to combat this threat.

Read also:

Latest