Zergeca Botnet: The Cyber Menace That Won’t Take a Day Off
Cybersecurity researchers have identified a new botnet, Zergeca, capable of DDoS attacks. Written in Golang, it boasts features like proxying, self-upgrading, and reverse shell. Notably, it uses DNS-over-HTTPS to cloak its command-and-control servers.
Hot Take:
Looks like the botnet world just got a new MVP with Zergeca. If Mirai was the Michael Jordan of DDoS, Zergeca is the LeBron James—or maybe the Steph Curry, given its flashy new tricks!
Key Points:
- New botnet Zergeca, written in Golang, has been discovered by cybersecurity researchers.
- Zergeca can perform six different DDoS attack methods and has additional capabilities like proxying, scanning, and reverse shell.
- Utilizes DNS-over-HTTPS (DoH) for C2 resolution and lesser-known Smux library for communications.
- Evidence suggests creators previously operated Mirai botnets.
- Targets include Canada, Germany, and the U.S.; features modules for persistence, proxy, silivaccine, and zombie functionalities.
Membership Required
You must be a member to access this content.