Skip to content

Top Stories

Top Stories

Primary Menu
  • Breaking News
  • UNIT CONVERTER
  • QR Code Generator
  • SEO META TAG GENERATOR
  • Background Remover Tool
  • Image Enhancer Tool
  • Image Converter Tool
  • Image Compressor Tool
  • Keyword Research Tool
  • Paint Tool
  • About Us
  • Contact Us
  • Privacy Policy
HOME PAGE
  • Home
  • Uncategorized
  • New Hpingbot Exploits Pastebin for Payload Delivery and Uses Hping3 for DDoS Attacks
  • Uncategorized

New Hpingbot Exploits Pastebin for Payload Delivery and Uses Hping3 for DDoS Attacks

VedVision HeadLines July 3, 2025
New Hpingbot Exploits Pastebin for Payload Delivery and Uses Hping3 for DDoS Attacks


NSFOCUS Fuying Lab’s Global Threat Hunting System has discovered a new botnet family called “hpingbot” that has been quickly expanding since June 2025, marking a significant shift in the cybersecurity scene.

This cross-platform botnet, built from scratch using the Go programming language, targets both Windows and Linux/IoT environments and supports multiple processor architectures including amd64, mips, arm, and 80386.

Unlike derivatives of well-known botnets like Mirai or Gafgyt, hpingbot showcases remarkable innovation by leveraging unconventional resources for stealth and efficiency, such as using the online text storage platform Pastebin for payload distribution and the network testing tool hping3 to execute Distributed Denial of Service (DDoS) attacks.

According to the Report, this approach not only enhances its ability to evade detection but also significantly reduces the costs associated with development and operation, making hpingbot a formidable and evolving threat in the digital realm.

Innovative Tactics

Hpingbot’s operational strategy is notably distinct, as it employs Pastebin to host and dynamically update malicious payloads, allowing attackers to adjust their load distribution frequently.

DDoS Attacks
Attack method

Monitoring data from Fuying Lab indicates that Pastebin links embedded in the botnet have shifted content multiple times since mid-June 2025, from hosting IP addresses to providing scripts for downloading additional components.

This flexibility is paired with the botnet’s reliance on hping3, a versatile command-line tool typically used for network diagnostics, to launch a variety of DDoS attacks such as SYN, UDP, and mixed-mode floods.

Interestingly, while the Windows version of hpingbot cannot utilize hping3 for DDoS attacks due to environmental limitations, its persistent activity underscores a broader focus on downloading and executing arbitrary payloads, hinting at intentions beyond mere network disruption.

The botnet’s low frequency of DDoS instructions only a few hundred since June 17, primarily targeting Germany, the United States, and Turkey further suggests that attackers are prioritizing infrastructure-building for subsequent malicious activities.

Rapid Evolution

The rapid iteration of hpingbot, with frequent updates to its Pastebin content, C&C servers, and installation scripts, points to a professional development team with long-term operational goals.

Since June 19, 2025, attackers have distributed additional Go-based DDoS components via hpingbot nodes, indicating a strategy to either replace parts of the original botnet or expand its payload distribution network.

DDoS Attacks
NetData

The presence of German debugging information in these components suggests they are in a testing phase, yet the attackers’ confidence in deploying them in live environments reflects a disregard for defensive measures.

Moreover, hpingbot’s independent SSH propagation module, persistence mechanisms via Systemd, SysVinit, and Cron, and trace-clearing techniques reveal a sophisticated approach to maintaining control over compromised systems.

As botnets increasingly serve as outposts for APT groups and ransomware campaigns, the potential for hpingbot to distribute more dangerous payloads remains a critical concern, warranting continuous vigilance and monitoring.

Indicators of Compromise (IOC)

Type Value
IP Address 45.139.113.61
IP Address 193.32.162.210
URL http://128.0.118.18
URL http://93.123.118.21
URL http://94.156.181.41
File Hash F33E6976E3692CB3E56A4CC9257F5AAE

Exclusive Webinar Alert: Harnessing Intel® Processor Innovations for Advanced API Security – Register for Free



Source link

Continue Reading

Previous: Full EU-US trade deal ‘impossible’ before deadline, says Ursula von der Leyen
Next: Reaction to death of Liverpool and Portugal player Diogo Jota – Reuters

Related News

Suspicious Activity Triggers FIU Investigation Into Binance, WazirX
  • Uncategorized

Suspicious Activity Triggers FIU Investigation Into Binance, WazirX

VedVision HeadLines July 13, 2025
US risks financial crisis ahead of midterm elections: former IMF official
  • Uncategorized

US risks financial crisis ahead of midterm elections: former IMF official

VedVision HeadLines July 13, 2025
Will It Blast Through 5,000 Or Slip Back To 0,000?
  • Uncategorized

Will It Blast Through $125,000 Or Slip Back To $110,000?

VedVision HeadLines July 13, 2025

Recent Posts

  • Delhi Confidential: Image change | Delhi Confidential News
  • Suspicious Activity Triggers FIU Investigation Into Binance, WazirX
  • KL Rahul was clinical in his approach and looked in control: Anil Kumble
  • The changing landscape of employment
  • US risks financial crisis ahead of midterm elections: former IMF official

Recent Comments

No comments to show.

Archives

  • July 2025
  • June 2025
  • May 2025
  • April 2025

Categories

  • Current Affairs
  • Shopping
  • Uncategorized

You may have missed

Delhi Confidential: Image change | Delhi Confidential News
  • Current Affairs

Delhi Confidential: Image change | Delhi Confidential News

VedVision HeadLines July 13, 2025
Suspicious Activity Triggers FIU Investigation Into Binance, WazirX
  • Uncategorized

Suspicious Activity Triggers FIU Investigation Into Binance, WazirX

VedVision HeadLines July 13, 2025
KL Rahul was clinical in his approach and looked in control: Anil Kumble
  • Current Affairs

KL Rahul was clinical in his approach and looked in control: Anil Kumble

VedVision HeadLines July 13, 2025
The changing landscape of employment
  • Current Affairs

The changing landscape of employment

VedVision HeadLines July 13, 2025
Copyright © All rights reserved. | MoreNews by AF themes.