The Nimble Nerd white logo

Zergeca Botnet: The Cyber Menace That Won’t Take a Day Off

Cybersecurity researchers have identified a new botnet, Zergeca, capable of DDoS attacks. Written in Golang, it boasts features like proxying, self-upgrading, and reverse shell. Notably, it uses DNS-over-HTTPS to cloak its command-and-control servers.

Hot Take:

Looks like the botnet world just got a new MVP with Zergeca. If Mirai was the Michael Jordan of DDoS, Zergeca is the LeBron James—or maybe the Steph Curry, given its flashy new tricks!

Key Points:

  • New botnet Zergeca, written in Golang, has been discovered by cybersecurity researchers.
  • Zergeca can perform six different DDoS attack methods and has additional capabilities like proxying, scanning, and reverse shell.
  • Utilizes DNS-over-HTTPS (DoH) for C2 resolution and lesser-known Smux library for communications.
  • Evidence suggests creators previously operated Mirai botnets.
  • Targets include Canada, Germany, and the U.S.; features modules for persistence, proxy, silivaccine, and zombie functionalities.

Membership Required

 You must be a member to access this content.

View Membership Levels