{"id":25723,"date":"2023-08-18T03:29:57","date_gmt":"2023-08-18T03:29:57","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=25723"},"modified":"2026-04-17T18:07:40","modified_gmt":"2026-04-17T18:07:40","slug":"from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/","title":{"rendered":"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>The botnet family &acirc;&euro;&oelig;Boat&acirc;&euro; was first discovered by NSFOCUS Security Labs in June 2022. Its name comes from the fact that malicious samples in its early versions propagate with the file name &#8220;boat&#8221;. At the same time, since some malicious samples in later versions of this family retain symbolic information and there are a large number of functions named after &#8220;ripper_*&#8221;, it is also called the botnet family &acirc;&euro;&oelig;Ripper&acirc;&euro;.<\/p>\n\n\n\n<p>In August 2023, the NSFOCUS&acirc;&euro;&trade;s global threat hunting system detected that the Boat family has accelerated its version upgrades and its activity has also significantly increased. It has grown into a non-negligible threat source. After more than one-year growth, the functions of Boat family tend to be perfect and many variants have been derived. Many attempts of Boat family in enhancing concealment and its possible independent propagation modules have attracted our attention again. In this article, we will sort out the changes in the Boat family over the past year.<\/p>\n\n\n\n<h2 class=\"has-black-color has-text-color wp-block-heading\">Evolution of Boat<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Propagation<\/h3>\n\n\n\n<p>We analyzed the newly captured attacker assets and found that the controllers of the Boat family had a large number of propagation scripts with different names.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Arsenals-of-Boat-controller.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"844\" height=\"636\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Arsenals-of-Boat-controller.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25724\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Arsenals-of-Boat-controller.jpg 844w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Arsenals-of-Boat-controller-300x226.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Arsenals-of-Boat-controller-768x579.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Arsenals-of-Boat-controller-600x452.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Arsenals-of-Boat-controller-200x151.jpg 200w\" sizes=\"(max-width: 844px) 100vw, 844px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\"> &#8220;Arsenals&#8221; of Boat controller<\/p>\n\n\n\n<p>The naming of those scripts in the Boat family seems to reveal information about potential attack targets, such as &#8220;android&#8221; and &#8220;ruckus&#8221;. Commonly used script names are as follows:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">android<\/td><td class=\"has-text-align-center\" data-align=\"center\">lboa<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">CCTV<\/td><td class=\"has-text-align-center\" data-align=\"center\">icam<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">athd<\/td><td class=\"has-text-align-center\" data-align=\"center\">faith<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">drilla<\/td><td class=\"has-text-align-center\" data-align=\"center\">ruckus<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Waps<\/td><td class=\"has-text-align-center\" data-align=\"center\">explot.*<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<p>It is worth noting that the attacker has a large number of propagation scripts named &#8220;exploit.*&#8221;, and we presumed that the attacker has tried to spread malware by exploiting vulnerabilities, but there is no built-in vulnerability exploitation module in Trojans. The known propagation methods of this family are mainly weak password brute force. All clues seem to imply that the controller of Boat also has an independent propagation module.<\/p>\n\n\n\n<p>In fact, in recent years we have detected an increasingly obvious trend that the botnet Trojan separates the propagation module from the Trojan body. Independent propagation modules not only improve the controllability of propagation but also help hide attacker resources and prevent important information such as 0-day vulnerabilities from being intercepted.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Scanning<\/h3>\n\n\n\n<p>In the early version of Boat family, C&amp;C will issue weak password pairs during online interaction. The later version has revised the overall design and directly used weak password pairs in scanning modules, which is more reasonable than the original version.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Weak-password-issued-by-the-Boat-controller.jpg\"><img decoding=\"async\" width=\"646\" height=\"684\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Weak-password-issued-by-the-Boat-controller.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25726\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Weak-password-issued-by-the-Boat-controller.jpg 646w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Weak-password-issued-by-the-Boat-controller-283x300.jpg 283w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Weak-password-issued-by-the-Boat-controller-600x635.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Weak-password-issued-by-the-Boat-controller-200x212.jpg 200w\" sizes=\"(max-width: 646px) 100vw, 646px\" \/><\/a><figcaption class=\"wp-element-caption\">Weak password issued by the Boat controller<\/figcaption><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p>Generally, the botnet controller is accustomed to embedding weak password pairs in malicious samples or storing them in special cipherbooks. This method of directly issuing weak passwords through C&amp;C communication traffic is rare.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Boat-scanning-module.jpg\"><img decoding=\"async\" width=\"346\" height=\"92\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Boat-scanning-module.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25728\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Boat-scanning-module.jpg 346w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Boat-scanning-module-300x80.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Boat-scanning-module-200x53.jpg 200w\" sizes=\"(max-width: 346px) 100vw, 346px\" \/><\/a><figcaption class=\"wp-element-caption\">Boat scanning module<\/figcaption><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Communication Protocol<\/h3>\n\n\n\n<p>The Boat family has been experimenting with different ways of communicating over the last year. The most common version is based on TCP protocol, followed by versions communicating with the C&amp;C server with UDP protocol.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Boat-communication-module.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"442\" height=\"211\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Boat-communication-module.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25730\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Boat-communication-module.jpg 442w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Boat-communication-module-300x143.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Boat-communication-module-200x95.jpg 200w\" sizes=\"(max-width: 442px) 100vw, 442px\" \/><\/a><figcaption class=\"wp-element-caption\">Boat communication module<\/figcaption><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p>The Boat family has also attempted to communicate using a tor proxy, but this was abandoned in subsequent releases.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Attempt-of-Boat-communication-based-on-Tor.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"429\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Attempt-of-Boat-communication-based-on-Tor-1024x429.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25732\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Attempt-of-Boat-communication-based-on-Tor-1024x429.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Attempt-of-Boat-communication-based-on-Tor-300x126.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Attempt-of-Boat-communication-based-on-Tor-768x322.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Attempt-of-Boat-communication-based-on-Tor-600x251.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Attempt-of-Boat-communication-based-on-Tor-200x84.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/Attempt-of-Boat-communication-based-on-Tor.jpg 1415w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Attempt of Boat communication based on Tor<\/figcaption><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p>In recent years, botnet operators have been making various attempts to enhance the camouflage of botnet communication. Either choose a more invisible tor proxy for communication or design complex interaction logic. To some extent, the attacker is more willing to devote more resources than the defender, which deserves our attention.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Versions<\/h3>\n\n\n\n<p>There are many variants of the Boat family, showing that multiple versions are active at the same time. The more active versions are as follows:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th>Rev.<\/th><th>Capture time<\/th><th>Change<\/th><\/tr><\/thead><tbody><tr><td>V1<\/td><td>Boat May to June 2022<\/td><td>The sample is propagated in the name of &#8220;boat + architecture name&#8221;, and the weak password pairs issued appear in online interaction traffic.<\/td><\/tr><tr><td>V1<\/td><td>Boat_jKira Mid of July 2022<\/td><td>Apply a weak password to the scanning module. The sample name is jKira+ architecture name, and the function named &#8220;ripper_*&#8221; begins to appear.<\/td><\/tr><tr><td>V1<\/td><td>Boat_tor Mid of&nbsp; October 2022<\/td><td>Attempt to communicate via Tor proxy<\/td><\/tr><tr><td>V2 &nbsp;<\/td><td>Boat_Ripper-v1 Captured April 2023 Increased activity in August<\/td><td>Modify the online package, and run the output &#8220;Komorebi&#8221; string<\/td><\/tr><tr><td>V2 <\/td><td>Boat_Ripper-v2 Captured April 2023 Increased activity in August<\/td><td>UDP communication, DDoS attack instructions and functions are added.<\/td><\/tr><tr><td>V2 <\/td><td>Boat_Ripper-3 June-July 2023<\/td><td>Obfuscate the instruction receiving module code; online parameters are sample startup parameters; enable local socks5 proxy and DNS resolution service; sample name is loki+ architecture name.<\/td><\/tr><tr><td>V3<\/td><td>&nbsp; End of July 2023<\/td><td>The DDoS attack module has changed greatly, running the output &#8220;[botpkt] Committing Suicid&#8221;.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Version change of Boat family<\/p>\n\n\n\n<p>Up to now, the malicious samples of this family cover almost all common IoT architectures, including:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">X86<\/td><td class=\"has-text-align-center\" data-align=\"center\">Armv7<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">X86_64<\/td><td class=\"has-text-align-center\" data-align=\"center\">Mpsl<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Arm<\/td><td class=\"has-text-align-center\" data-align=\"center\">Mips<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Arm5<\/td><td class=\"has-text-align-center\" data-align=\"center\">Ppc<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Arm6<\/td><td class=\"has-text-align-center\" data-align=\"center\">Sh4<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<p>We have noticed that the source code of Mirai family is into each version of Boat family to varying degrees. Attackers will use some codes of known families when building new botnet families, which not only facilitates code reuse, but also deceives antivirus engines in this way and reduces the probability of being filtered out for manual analysis. This approach is less noticeable than constructing an entirely new family without any detection history.<\/p>\n\n\n\n<h2 class=\"has-black-color has-text-color wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>In the past year, Boat family controllers have attached great importance to the invisibility of Trojans. They deliberately added signature codes of botnet families such as Mirai to deceive antivirus software engines and reduce the probability of manual analysis. In addition, it has also tried to achieve better concealment through Tor and Socks. Boat controllers are also likely to have separate propagation modules that protect their resources from disclosure. The versions of the Boat family change very fast, multiple versions spread at the same time, with a wide range of activities and high originality. There are professional attack gangs behind it. NSFOCUS security researchers will continue to keep a close eye on Boat family and their controllers.<\/p>\n\n\n\n<p><strong>IoC<\/strong><\/p>\n\n\n\n<p>0bd4197fedbf6b3141427067f548d1acd65c5924f906ff3246602e8258e62b72<br>117d63cd098e29467fabf02345075a31c4cd735a18119e9206943f43e0e105ad<br>1233ae9e89ffb77b247aeb998e453a83bc96496aa171e0fde8322199f779cbc8<br>141ab6882632101808a6338e0a5cfd7b031cc2b3f6e152b700afd2653298bb5e<br>d4f9b424a1639bc3c46726e4f72c259bf6b9ca33af7377490b1bb292867603e7<br>A0FFF5A783E05DDC95A6951F3DD9E31E88CD2E0591605F0543D0F7186B83B11D<br>9a86408d4f16a39f61889f61713eecd68ff8e8a246df7f2a0d04c02a672d5fc9<br>e97f19050259ff7207e09241b55c98bebc8eb4ac3b94b1251beb07bb60e00061<br>9230ce12254f7a0960ec9c8add482c2db6ed7cf863439cab65390145586ad07e<br>9a86408d4f16a39f61889f61713eecd68ff8e8a246df7f2a0d04c02a672d5fc9<br>df5655ee4f33d8597fd9bd174042880cd3600a44b5dff69df996841d0c0db18e<br>aff3e8167b01998037b2eb04703d5c7007e3ac6d6ffb1de5a193b201a0802693<br>6b60da1f062d5ac0a1834e7ca0ad4bda<br>6e11f805db7c9acf6d1784796235aea3<br>8591f0616e7e0051e949e8dad960fcad<br>38214ee8a8add498e4fb6e497b5d24a2<br>190587c78ce2bcad72f0bd1198617746<br>a151900e43f3a9adad7a31de8f7e49e3<br>d18ef9ad1cbbc56046e93e388cc5d2c9<\/p>\n\n\n\n<p>172.245.186.189<br>46.249.32.102<br>162.33.23.74<br>85.217.144.191<br>194.55.224.126<br>194.55.224.182<br>87.120.88.117<br>87.120.88.118<br>149.57.171.148<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>The botnet family &acirc;&euro;&oelig;Boat&acirc;&euro; was first discovered by NSFOCUS Security Labs in June 2022. Its name comes from the fact that malicious samples in its early versions propagate with the file name &#8220;boat&#8221;. At the same time, since some malicious samples in later versions of this family retain symbolic information and there are a large [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25734,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[118],"class_list":["post-25723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-botnet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet - NSFOCUS<\/title>\n<meta name=\"description\" content=\"NSFOCUS Security Labs detected the Botnet &quot;Boat&quot; has been very active recently. It has grown into a non-negligible threat source.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"NSFOCUS Security Labs detected the Botnet &quot;Boat&quot; has been very active recently. It has grown into a non-negligible threat source.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-18T03:29:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/WXWorkCapture_16923291401850.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"NSFOCUS Security Labs detected the Botnet &quot;Boat&quot; has been very active recently. It has grown into a non-negligible threat source.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/WXWorkCapture_16923291401850.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet\",\"datePublished\":\"2023-08-18T03:29:57+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/\"},\"wordCount\":1224,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/WXWorkCapture_16923291401850.png\",\"keywords\":[\"Botnet\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/\",\"name\":\"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/WXWorkCapture_16923291401850.png\",\"datePublished\":\"2023-08-18T03:29:57+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"description\":\"NSFOCUS Security Labs detected the Botnet \\\"Boat\\\" has been very active recently. It has grown into a non-negligible threat source.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/WXWorkCapture_16923291401850.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/WXWorkCapture_16923291401850.png\",\"width\":585,\"height\":350,\"caption\":\"Stormy sea under a dramatic cloudy sky.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet - NSFOCUS","description":"NSFOCUS Security Labs detected the Botnet \"Boat\" has been very active recently. It has grown into a non-negligible threat source.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet - NSFOCUS","og_description":"NSFOCUS Security Labs detected the Botnet &quot;Boat&quot; has been very active recently. It has grown into a non-negligible threat source.","og_url":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/","og_site_name":"NSFOCUS","article_published_time":"2023-08-18T03:29:57+00:00","article_modified_time":"2026-04-17T18:07:40+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/WXWorkCapture_16923291401850.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet - NSFOCUS","twitter_description":"NSFOCUS Security Labs detected the Botnet &quot;Boat&quot; has been very active recently. It has grown into a non-negligible threat source.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/WXWorkCapture_16923291401850.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet","datePublished":"2023-08-18T03:29:57+00:00","dateModified":"2026-04-17T18:07:40+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/"},"wordCount":1224,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/WXWorkCapture_16923291401850.png","keywords":["Botnet"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/","url":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/","name":"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/WXWorkCapture_16923291401850.png","datePublished":"2023-08-18T03:29:57+00:00","dateModified":"2026-04-17T18:07:40+00:00","description":"NSFOCUS Security Labs detected the Botnet \"Boat\" has been very active recently. It has grown into a non-negligible threat source.","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/WXWorkCapture_16923291401850.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/WXWorkCapture_16923291401850.png","width":585,"height":350,"caption":"Stormy sea under a dramatic cloudy sky."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/from-ripples-to-waves-the-swift-evolution-of-the-boat-botnet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"From Ripples to Waves: The Swift Evolution of the \u201cBoat\u201d Botnet"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/25723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=25723"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/25723\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/25734"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=25723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=25723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=25723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}