blog.netlab.360.com/matryosh-botnet-is-spreading-en

Preview meta tags from the blog.netlab.360.com website.

Linked Hostnames

5

Thumbnail

Search Engine Appearance

Google

https://blog.netlab.360.com/matryosh-botnet-is-spreading-en

New Threat: Matryosh Botnet Is Spreading

Background On January 25, 2021, 360 netlab BotMon system labeled a suspicious ELF file as Mirai, but the network traffic did not match Mirai's characteristics. This anomaly caught our attention, and after analysis, we determined that it was a new botnet that reused the Mirai framework, propagated through the ADB



Bing

New Threat: Matryosh Botnet Is Spreading

https://blog.netlab.360.com/matryosh-botnet-is-spreading-en

Background On January 25, 2021, 360 netlab BotMon system labeled a suspicious ELF file as Mirai, but the network traffic did not match Mirai's characteristics. This anomaly caught our attention, and after analysis, we determined that it was a new botnet that reused the Mirai framework, propagated through the ADB



DuckDuckGo

https://blog.netlab.360.com/matryosh-botnet-is-spreading-en

New Threat: Matryosh Botnet Is Spreading

Background On January 25, 2021, 360 netlab BotMon system labeled a suspicious ELF file as Mirai, but the network traffic did not match Mirai's characteristics. This anomaly caught our attention, and after analysis, we determined that it was a new botnet that reused the Mirai framework, propagated through the ADB

  • General Meta Tags

    12
    • title
      New Threat: Matryosh Botnet Is Spreading
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • HandheldFriendly
      True
    • viewport
      width=device-width, initial-scale=1.0
  • Open Graph Meta Tags

    8
    • og:site_name
      360 Netlab Blog - Network Security Research Lab at 360
    • og:type
      article
    • og:title
      New Threat: Matryosh Botnet Is Spreading
    • og:description
      Background On January 25, 2021, 360 netlab BotMon system labeled a suspicious ELF file as Mirai, but the network traffic did not match Mirai's characteristics. This anomaly caught our attention, and after analysis, we determined that it was a new botnet that reused the Mirai framework, propagated through the ADB
    • og:url
      https://blog.netlab.360.com/matryosh-botnet-is-spreading-en/
  • Twitter Meta Tags

    11
    • twitter:card
      summary_large_image
    • twitter:title
      New Threat: Matryosh Botnet Is Spreading
    • twitter:description
      Background On January 25, 2021, 360 netlab BotMon system labeled a suspicious ELF file as Mirai, but the network traffic did not match Mirai's characteristics. This anomaly caught our attention, and after analysis, we determined that it was a new botnet that reused the Mirai framework, propagated through the ADB
    • twitter:url
      https://blog.netlab.360.com/matryosh-botnet-is-spreading-en/
    • twitter:image
      https://blog.netlab.360.com/content/images/2019/02/astronomy-constellation-dark-998641-4.jpg
  • Link Tags

    7
    • alternate
      https://blog.netlab.360.com/rss/
    • amphtml
      https://blog.netlab.360.com/matryosh-botnet-is-spreading-en/amp/
    • canonical
      https://blog.netlab.360.com/matryosh-botnet-is-spreading-en/
    • icon
      https://blog.netlab.360.com/content/images/size/w256h256/2019/02/netlab_xs-2.png
    • stylesheet
      /assets/built/screen.css?v=2cbc1d8e23

Links

23