{"id":27839,"date":"2024-01-16T04:13:54","date_gmt":"2024-01-16T04:13:54","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=27839"},"modified":"2026-04-17T18:07:39","modified_gmt":"2026-04-17T18:07:39","slug":"nsfocus-reveals-new-botnet-family-rddos","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/nsfocus-reveals-new-botnet-family-rddos\/","title":{"rendered":"NSFOCUS Reveals New Botnet Family RDDoS"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">1. Introduction of the New Botnet RDDoS<\/h2>\n\n\n\n<p>In early November 2023, NSFOCUS&acirc;&euro;&trade;s Global Threat Hunting System detected that an unknown elf file was spreading widely, which aroused our vigilance. After further analysis, we confirmed that this batch of elf samples belonged to a new botnet family. NSFOCUS Security Research Labs named the botnet Trojan as RDDoS.<\/p>\n\n\n\n<p>The main function of the RDDoS is to launch DDoS attacks and it has the ability to execute commands, which further improves its threat. RDDoS also sets online parameters to distinguish the type of infected devices, and at the same time distinguishes real devices and sandboxes by whether the online package carries operating parameters. RDDoS has strong adversarial capabilities.<\/p>\n\n\n\n<p>Monitoring data shows that RDDoS tends to use ICMP_flood method to launch DDoS attacks on targets 24 hours a day, and nearly 80% of attack activities are carried out in this way. In terms of target selection, the first choice for RDDoS was the United States (36%), followed by Brazil (22%) and France (15%). In addition, countries such as China, Germany and the Netherlands were also affected.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture2.jpg\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-27865\" width=\"695\" height=\"339\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture2.jpg 919w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture2-300x147.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture2-768x376.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture2-600x294.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture2-200x98.jpg 200w\" sizes=\"(max-width: 695px) 100vw, 695px\" \/><\/a><figcaption class=\"wp-element-caption\">Distribution of RDDoS Attack Targets<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Sample Analysis of Botnet RDDoS<\/h2>\n\n\n\n<p><strong>Host-side Behaviors<\/strong><\/p>\n\n\n\n<p>RDDoS will first change the working directory of the current process to the root directory during operation, and then create a sub-process. If the sub-process is not created successfully, it will exit directly. After the sub-process is created successfully, subsequent functions will continue to be executed in the sub-process.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Initial-Phase.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Initial-Phase.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-27843\" width=\"433\" height=\"618\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Initial-Phase.png 633w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Initial-Phase-210x300.png 210w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Initial-Phase-600x857.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Initial-Phase-200x286.png 200w\" sizes=\"(max-width: 433px) 100vw, 433px\" \/><\/a><figcaption class=\"wp-element-caption\">Initial Phase<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>There are two ways for the controlled terminal to execute on the victim host, with and without parameters. Different ways determine the content of the online package when it is first launched. It is presumed that the attacker&#8217;s intention is to make a corresponding judgment according to the online content. The online parameters can be used to distinguish the type of infected device. In addition, if the online package contains parameters and the parameters are correct, it indicates that the controlled terminal is issued by the attacker; if the controlled terminal does not carry parameters during execution, the &#8220;unknown&#8221; string will be spliced into the online content, indicating that the Trojan may be in a sandbox environment.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Execution-Phase.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Execution-Phase.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-27845\" width=\"441\" height=\"370\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Execution-Phase.png 676w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Execution-Phase-300x252.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Execution-Phase-600x504.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Execution-Phase-200x168.png 200w\" sizes=\"(max-width: 441px) 100vw, 441px\" \/><\/a><figcaption class=\"wp-element-caption\">Execution Phase<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><strong>Online Package Characteristics<\/strong><\/p>\n\n\n\n<p>In the process of establishing a connection with the control terminal, the controlled terminal will splice the command line parameters as an online package. When no parameter is transmitted, the &#8220;unknown&#8221; string will be spliced, as shown in the following figure.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Construct-On-line-Package.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Construct-On-line-Package-1024x187.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-27847\" width=\"637\" height=\"116\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Construct-On-line-Package-1024x187.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Construct-On-line-Package-300x55.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Construct-On-line-Package-768x140.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Construct-On-line-Package-600x110.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Construct-On-line-Package-200x37.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Construct-On-line-Package.png 1112w\" sizes=\"(max-width: 637px) 100vw, 637px\" \/><\/a><figcaption class=\"wp-element-caption\">Construct On-line Package<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>The traffic generated when going online is shown in the following figure:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Splicing-Packets-with-Command-Line-Parameters.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Splicing-Packets-with-Command-Line-Parameters.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-27849\" width=\"472\" height=\"32\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Splicing-Packets-with-Command-Line-Parameters.png 472w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Splicing-Packets-with-Command-Line-Parameters-300x20.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Splicing-Packets-with-Command-Line-Parameters-200x14.png 200w\" sizes=\"(max-width: 472px) 100vw, 472px\" \/><\/a><figcaption class=\"wp-element-caption\">Splicing Packets with Command-Line Parameters<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Splicing-Packets-without-Command-Line-Parameters.png\"><img loading=\"lazy\" decoding=\"async\" width=\"476\" height=\"31\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Splicing-Packets-without-Command-Line-Parameters.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-27851\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Splicing-Packets-without-Command-Line-Parameters.png 476w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Splicing-Packets-without-Command-Line-Parameters-300x20.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Splicing-Packets-without-Command-Line-Parameters-200x13.png 200w\" sizes=\"(max-width: 476px) 100vw, 476px\" \/><\/a><figcaption class=\"wp-element-caption\">Splicing Packets without Command-Line Parameters<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><strong>Instruction Analysis<\/strong><\/p>\n\n\n\n<p>After the online operation is completed, the controlled terminal waits for an instruction issued by the control terminal and judges subsequent operations according to parameters such as instruction length and first-byte value. The implementation process is as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture1.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture1-1024x963.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-27855\" width=\"627\" height=\"590\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture1-1024x963.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture1-300x282.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture1-768x722.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture1-1536x1445.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture1-600x564.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture1-200x188.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Picture1.jpg 1581w\" sizes=\"(max-width: 627px) 100vw, 627px\" \/><\/a><figcaption class=\"wp-element-caption\">RDDoS Instruction Processing Flow<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>When the first byte of received data is &#8220;0x02&#8221;, the bot process terminates; when the first byte of received data is &#8220;0x03&#8221;, the sub-process created earlier ends; when the first byte of received data is &#8220;0x04&#8221;, the bot executes the corresponding command through \/bin\/sh.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Directives.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Directives-1024x618.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-27857\" width=\"600\" height=\"361\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Directives-1024x618.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Directives-300x181.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Directives-768x463.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Directives-600x362.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Directives-200x121.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Directives.png 1076w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><figcaption class=\"wp-element-caption\">Directives<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>The DDoS function is executed when the data length received by the bot is greater than 13 and the first byte is &#8220;0x05&#8221;, &#8220;0x06&#8221;, &#8220;0x07&#8221;, &#8220;0x08&#8221; or &#8220;0x09&#8221;.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Launch-DDoS-Attacks.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Launch-DDoS-Attacks-1024x774.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-27859\" width=\"724\" height=\"546\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Launch-DDoS-Attacks-1024x774.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Launch-DDoS-Attacks-300x227.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Launch-DDoS-Attacks-768x580.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Launch-DDoS-Attacks-600x453.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Launch-DDoS-Attacks-200x151.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/Launch-DDoS-Attacks.png 1268w\" sizes=\"(max-width: 724px) 100vw, 724px\" \/><\/a><figcaption class=\"wp-element-caption\">Launch DDoS Attack<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>The DDoS attack instruction is parsed as follows:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Table 1 Instruction Parsing<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Receive Data<\/strong><\/td><td><strong>Implication<\/strong><\/td><td><strong>Comment<\/strong><\/td><\/tr><tr><td>recv_buf[0]<\/td><td>Attack type<\/td><td>1 byte to determine the type of attack (e.g. 0x05-&gt;UDP, 0x06-&gt;ICMP, 0x07-&gt;TCP_SYN, 0x08-&gt;TCP_ACK, 0x09-&gt;TCP_PSH_ACK)<\/td><\/tr><tr><td>recv_buf[1-4]<\/td><td>Destination IP<\/td><td>4 bytes, determining the IP address of the target host<\/td><\/tr><tr><td>recv_buf[5-6]<\/td><td>Destination port<\/td><td>2 bytes, determine the target host port. If it is 0x0000, it will be randomly generated<\/td><\/tr><tr><td>recv_buf[7-10]<\/td><td>Attack duration<\/td><td>4 bytes, determining the attack duration<\/td><\/tr><tr><td>recv_buf[11-12]<\/td><td>Packet length<\/td><td>2 bytes, determining the length of data packets sent to the target host<\/td><\/tr><tr><td>recv_buf[13]<\/td><td>Source IP structure<\/td><td>1 byte. The value of 1 indicates that the source IP is randomized, and other values indicate that the source IP is the IP address of the controlled host<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">3. Conclusion<\/h2>\n\n\n\n<p>The RDDoS is relatively uncomplicated. It is a new botnet family built from scratch. Recently, its controllers have continuously updated and iterated the Trojan to add new DDoS attack methods and improve functions. It is worth noting that it also possesses command execution capabilities, which further increases the level of threat it poses.<\/p>\n\n\n\n<p>In recent years, it has been common for attackers to use botnets as channels and then launch APT or ransomware attacks based on them. We need to strengthen our attention to this type of botnet, as most of the newly emerging botnet families, although appearing to be extremely simple-looking Trojans, may have a constant influx of variants.<\/p>\n\n\n\n<p>We infer that the family will remain active for some time to come, and NSFOCUS Security Research Labs will continue to strengthen its monitoring of this botnet family and the threat actors operating behind it.<\/p>\n\n\n\n<p><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/products\/anti-ddos-system-ads\/\">NSFOCUS Anti-DDoS<\/a> solution stands at the forefront of safeguarding organizations against the rising threat of RDDoS attacks. Leveraging a vast database of global threat intelligence and cutting-edge technology, NSFOCUS provides a comprehensive defense mechanism to detect, mitigate, and neutralize &nbsp;RDDoS threats effectively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. IOC<\/h2>\n\n\n\n<p>09b8159120088fea909b76f00280e3ebca23a54f2b41d967d0c89ebb82debdbf<\/p>\n\n\n\n<p>7ca0663c88c59b83f26b6ae8664d189a<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>1. Introduction of the New Botnet RDDoS In early November 2023, NSFOCUS&acirc;&euro;&trade;s Global Threat Hunting System detected that an unknown elf file was spreading widely, which aroused our vigilance. After further analysis, we confirmed that this batch of elf samples belonged to a new botnet family. NSFOCUS Security Research Labs named the botnet Trojan as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":27873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[118,372],"class_list":["post-27839","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-botnet","tag-ddos-attack"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NSFOCUS Reveals New Botnet Family RDDoS - NSFOCUS<\/title>\n<meta name=\"description\" content=\"NSFOCUS detected a new botnet family - RDDoS targeting global networks with DDoS assaults. Stay protected from the threat and its variants!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSFOCUS Reveals New Botnet Family RDDoS - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"NSFOCUS detected a new botnet family - RDDoS targeting global networks with DDoS assaults. Stay protected from the threat and its variants!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-16T04:13:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/RDDoS.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"NSFOCUS Reveals New Botnet Family RDDoS - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"NSFOCUS detected a new botnet family - RDDoS targeting global networks with DDoS assaults. Stay protected from the threat and its variants!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/RDDoS.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"NSFOCUS Reveals New Botnet Family RDDoS\",\"datePublished\":\"2024-01-16T04:13:54+00:00\",\"dateModified\":\"2026-04-17T18:07:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/\"},\"wordCount\":917,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/RDDoS.jpg\",\"keywords\":[\"Botnet\",\"DDoS attack\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/\",\"name\":\"NSFOCUS Reveals New Botnet Family RDDoS - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/RDDoS.jpg\",\"datePublished\":\"2024-01-16T04:13:54+00:00\",\"dateModified\":\"2026-04-17T18:07:39+00:00\",\"description\":\"NSFOCUS detected a new botnet family - RDDoS targeting global networks with DDoS assaults. Stay protected from the threat and its variants!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/RDDoS.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/RDDoS.jpg\",\"width\":100,\"height\":60,\"caption\":\"RDDOS attack concept with digital map.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-reveals-new-botnet-family-rddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NSFOCUS Reveals New Botnet Family RDDoS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSFOCUS Reveals New Botnet Family RDDoS - NSFOCUS","description":"NSFOCUS detected a new botnet family - RDDoS targeting global networks with DDoS assaults. Stay protected from the threat and its variants!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"NSFOCUS Reveals New Botnet Family RDDoS - NSFOCUS","og_description":"NSFOCUS detected a new botnet family - RDDoS targeting global networks with DDoS assaults. Stay protected from the threat and its variants!","og_url":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/","og_site_name":"NSFOCUS","article_published_time":"2024-01-16T04:13:54+00:00","article_modified_time":"2026-04-17T18:07:39+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/RDDoS.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"NSFOCUS Reveals New Botnet Family RDDoS - NSFOCUS","twitter_description":"NSFOCUS detected a new botnet family - RDDoS targeting global networks with DDoS assaults. Stay protected from the threat and its variants!","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/RDDoS.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"NSFOCUS Reveals New Botnet Family RDDoS","datePublished":"2024-01-16T04:13:54+00:00","dateModified":"2026-04-17T18:07:39+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/"},"wordCount":917,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/RDDoS.jpg","keywords":["Botnet","DDoS attack"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/","url":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/","name":"NSFOCUS Reveals New Botnet Family RDDoS - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/RDDoS.jpg","datePublished":"2024-01-16T04:13:54+00:00","dateModified":"2026-04-17T18:07:39+00:00","description":"NSFOCUS detected a new botnet family - RDDoS targeting global networks with DDoS assaults. Stay protected from the threat and its variants!","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/RDDoS.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/01\/RDDoS.jpg","width":100,"height":60,"caption":"RDDOS attack concept with digital map."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/nsfocus-reveals-new-botnet-family-rddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"NSFOCUS Reveals New Botnet Family RDDoS"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/27839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=27839"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/27839\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/27873"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=27839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=27839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=27839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}