{"id":30843,"date":"2024-11-21T03:00:58","date_gmt":"2024-11-21T03:00:58","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=30843"},"modified":"2026-04-17T18:07:36","modified_gmt":"2026-04-17T18:07:36","slug":"alert-xorbot-comes-back-with-enhanced-tactics","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/alert-xorbot-comes-back-with-enhanced-tactics\/","title":{"rendered":"Alert: XorBot Comes Back with Enhanced Tactics"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>I. Overview<\/strong><\/h2>\n\n\n\n<p>According to the monitoring by NSFOCUS, since the beginning of 2024, a new-type botnet family with a high level of anti-tracking awareness&acirc;&euro;&rdquo;XorBot&acirc;&euro;&rdquo;has been continuously updating its versions and introducing new features, undergoing significant changes.<\/p>\n\n\n\n<p>This botnet family first emerged in November 2023 and was <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/xorbot-a-stealthy-botnet-family-that-defies-detection\/\" target=\"_blank\" rel=\"noreferrer noopener\">exclusively disclosed<\/a> by the NSFOCUS Security Labs in December 2023.<\/p>\n\n\n\n<p>To date, XorBot has become an undeniable security threat in the field of the Internet of Things (IoT), with attackers primarily targeting devices such as Intelbras cameras and routers from TP-Link and D-Link, leading to a large number of IoT devices being compromised.<\/p>\n\n\n\n<p>As the number of devices controlled by this botnet increases, the operators behind it have also begun to actively engage in profitable operations, openly advertising DDoS attack rental services.<\/p>\n\n\n\n<p>Notably, due to its newly registered channel name &#8220;Masjesu Botnet,&#8221; the security community is also accustomed to naming this family as &#8220;Masjesu.&#8221; The software released by this family includes a clear version identification, and to date, the latest version has been updated to version 1.04.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image5.png\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image5.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-30859\" width=\"574\" height=\"429\"><\/a><figcaption class=\"wp-element-caption\">Figure 1.1 Masjesu&#8217;s Telegram Channel <\/figcaption><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>II. Propagation<\/strong><\/h2>\n\n\n\n<p>This botnet primarily targets IoT devices from brands such as Intelbras surveillance cameras, TP-Link, and D-Link for propagation. Once an attack is successful, it runs a malicious Trojan program on the compromised device, with the latest version of the Trojan built-in with up to 12 different exploit methods, as listed below:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><td><strong>Vulnerability<\/strong><\/td><td><strong>Target Devices<\/strong><\/td><\/tr><\/thead><tbody><tr><td>UPnP SOAP TelnetD Command Execution<\/td><td>D-Link devices<\/td><\/tr><tr><td>Netgear cgi-bin Command Injection<\/td><td>Netgear R7000\/R6400 devices<\/td><\/tr><tr><td>CCTV\/DVR Remote Code Execution<\/td><td>CCTVs, DVRs from over 70 vendors<\/td><\/tr><tr><td>HNAP SoapAction-Header Command Execution<\/td><td>D-Link devices<\/td><\/tr><tr><td>JAWS Webserver unauthenticated shell command execution<\/td><td>MVPower DVRs, among others<\/td><\/tr><tr><td>Netgear setup.cgi unauthenticated RCE<\/td><td>DGN1000 Netgear routers<\/td><\/tr><tr><td>Vacron NVR RCE<\/td><td>Vacron NVR devices<\/td><\/tr><tr><td>Eir WAN Side Remote Command Injection<\/td><td>Eir D1000 routers<\/td><\/tr><tr><td>CVE-2014-8361<\/td><td>Different devices using the Realtek SDK with the miniigd daemon<\/td><\/tr><tr><td>CVE-2017-17215<\/td><td>Huawei HG532<\/td><\/tr><tr><td>GPON Exploit<\/td><td>GPON<\/td><\/tr><tr><td>CVE-2023-1389<\/td><td>TP-Link<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>After successfully exploiting the vulnerabilities to infiltrate the devices, the Trojan is placed in the \/tmp directory of the infected device:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/Data-in-tmp-Directory.jpeg\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/Data-in-tmp-Directory.jpeg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-30845\" width=\"720\" height=\"120\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/Data-in-tmp-Directory.jpeg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/Data-in-tmp-Directory-300x50.jpeg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/Data-in-tmp-Directory-200x33.jpeg 200w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 2.1 Data in \/tmp Directory<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>The process information of the infected device is as follows (\/tmp\/mipsel):<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image7.jpeg\"><img decoding=\"async\" width=\"473\" height=\"50\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image7.jpeg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-30847\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image7.jpeg 473w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image7-300x32.jpeg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image7-200x21.jpeg 200w\" sizes=\"(max-width: 473px) 100vw, 473px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 2.2 Process Information of Infected Device<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>III. Trojan Analysis<\/strong><\/h2>\n\n\n\n<p>3.1 Trojan Version Changes<\/p>\n\n\n\n<p>The latest version of XorBot, while maintaining a high degree of similarity with earlier versions, also shows significant differences, mainly in the following aspects:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In the release phase, both adopt similar anti-tracking ideas, but the specific implementation paths differ. Although they both take a passive online strategy, there are differences in the verification process and online characteristics;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A new version identification field has been added, and the current latest version has been updated to 1.04;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>They have different flooding attack modules, and there are differences in code style. The early version included 5 flooding attack modes only, while this number has expanded to more than 10 in the latest version.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>More than ten kinds of vulnerability exploitation techniques have been newly integrated.<\/li>\n<\/ul>\n\n\n\n<p>Over the past year, this family has gone through multiple version iterations, and the active periods of each version are shown below:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><td><strong>Version<\/strong><\/td><td><strong>Time<\/strong><\/td><td><strong>Features<\/strong><\/td><\/tr><\/thead><tbody><tr><td>V1<\/td><td>Early November 2023<\/td><td>File size 30k, no version string<\/td><\/tr><tr><td>V2<\/td><td>Mid-November 2023<\/td><td>Static linking, added a large amount of invalid code to cover malicious branches, making the detection rate of current antivirus engines close to 0<\/td><\/tr><tr><td>V3<\/td><td>Early June 2024<\/td><td>First appearance of version string 1.01<\/td><\/tr><tr><td>V4<\/td><td>Mid-June 2024<\/td><td>Appearance of version string 1.02<\/td><\/tr><tr><td>V5<\/td><td>End of June 2024<\/td><td>Appearance of version string 1.03, attack methods increased to 12<\/td><\/tr><tr><td>V6<\/td><td>Early November 2024<\/td><td>Appearance of version string 1.04, added 12 exploit methods<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>3.2 Supported Architectures<\/p>\n\n\n\n<p>Recently, this malicious software family has been unusually active, and its propagation scripts significantly demonstrate a wide compatibility with various CPU architectures, covering MIPS, PowerPC, ARM, and x86_64, among others.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image8-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image8-2-1024x317.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-30849\" width=\"768\" height=\"238\"><\/a><figcaption class=\"wp-element-caption\">Figure 3.1 Propagation Script<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>3.3 Encryption and Decryption Methods<\/p>\n\n\n\n<p>The Trojan uses a multi-round XOR encryption technique similar to the Mirai family and introduces a new table_key (specific values are 0x16, 0x9F, 0x08, 0x00). The design of its decryption algorithm is as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image9-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image9-2.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-30851\" width=\"578\" height=\"236\"><\/a><figcaption class=\"wp-element-caption\">Figure 3.2 Decryption Algorithm<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>3.4 Persistence Methods<\/p>\n\n\n\n<p>The Trojan disguises itself as a legitimate system component by replacing the system&#8217;s critical file \/usr\/lib\/ld-unix.so.2, thereby increasing its stealthiness. In addition, it writes itself or related execution commands into the system&#8217;s crontab configuration to ensure automatic execution even after a system reboot, achieving persistence of malicious behavior.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/Persistence.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/Persistence.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-30853\" width=\"522\" height=\"340\"><\/a><figcaption class=\"wp-element-caption\">Figure 3.3 Persistence<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>Furthermore, the Trojan also changes the permission settings of the \/tmp directory, restricting it to read-only by the file owner, thereby monopolizing the target device&#8217;s resources and effectively preventing other botnets or malware from entering the system and using that directory for their activities.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/Monopolizing-Devices.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/Monopolizing-Devices.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-30855\" width=\"581\" height=\"336\"><\/a><figcaption class=\"wp-element-caption\">Figure 3.4 Monopolizing Devices<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>3.5 Online Characteristics<\/p>\n\n\n\n<p>The Trojan shows strong anti-tracking characteristics and adopts a passive online method during the release process. That is, after establishing a connection with the control end, it does not immediately send an online package but waits to receive data from the control end. This data is randomly generated and varies with each connection. Subsequently, the client will feedback the received random string, the architecture information of the compromised host, and the Trojan&#8217;s version identification to the server end. This design increases the difficulty of tracking based on signature detection. The Trojan has a clear version identification, and the latest version has been updated to 1.04.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image12.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image12.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-30861\"><\/a><figcaption class=\"wp-element-caption\">Figure 3.5 Construction of Release Package<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>The actual traffic generated is as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image13.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/image13.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-30863\"><\/a><figcaption class=\"wp-element-caption\">Figure 3.6 Release Traffic<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>3.6 DDoS Attack Methods<\/p>\n\n\n\n<p>The Trojan supports various types of DDoS attack methods, including but not limited to UDP, TCP, and HTTP attacks. After receiving instructions from the server, it first performs decryption and then selects and assigns the corresponding attack method based on the length difference of the data returned by the server.<\/p>\n\n\n\n<p>In the latest version, the attack methods supported by the Trojan include:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><td><strong>Instruction Length<\/strong><\/td><td><strong>Instruction Content<\/strong><\/td><td><strong>Attack Method<\/strong><\/td><\/tr><\/thead><tbody><tr><td>21<\/td><td>udp<\/td><td>UDP Flood<\/td><\/tr><tr><td>22<\/td><td>handshake<\/td><td>UDP Flood<\/td><\/tr><tr><td>23<\/td><td>vse<\/td><td>UDP Flood<\/td><\/tr><tr><td>24<\/td><td>gre<\/td><td>UDP Flood<\/td><\/tr><tr><td>25<\/td><td>rdp<\/td><td>UDP Flood<\/td><\/tr><tr><td>26<\/td><td>ospf<\/td><td>UDP Flood<\/td><\/tr><tr><td>27<\/td><td>icmp<\/td><td>ICMP Flood<\/td><\/tr><tr><td>28<\/td><td>igmp<\/td><td>UDP Flood<\/td><\/tr><tr><td>29<\/td><td>Protorand<\/td><td>UDP Flood<\/td><\/tr><tr><td>30<\/td><td>tcp_syn<\/td><td>TCP_SYN Flood<\/td><\/tr><tr><td>31<\/td><td>tcp_ack<\/td><td>TCP-ACK Flood<\/td><\/tr><tr><td>32<\/td><td>tcp_ackpsh<\/td><td>TCP-ACKPSH Flood<\/td><\/tr><tr><td>33<\/td><td>http<\/td><td>HTTP Flood<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>V. Conclusion<\/strong><\/h2>\n\n\n\n<p>As an emerging botnet family, XorBot is showing a strong growth momentum, continuously infiltrating and controlling new IoT devices. Notably, these controllers are increasingly inclined to use social media platforms such as Telegram as the main channels for recruitment and promotion, attracting target &#8220;customers&#8221; through initial active promotional activities, laying a solid foundation for the subsequent expansion and development of the botnet.<\/p>\n\n\n\n<p>In addition, the controllers of the botnet are continuously increasing their investment in anti-detection and anti-tracking technologies, enhancing the stealthiness of the communication level by designing unique communication interaction logic, increasing the difficulty of tracking. At the same time, by adopting advanced technical means such as inserting redundant code and obfuscating sample signatures, they have improved the defensive capabilities at the file level, making their attack behavior more difficult to monitor and identify.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>VI. IoC<\/strong><\/h2>\n\n\n\n<p>conn.masjesu.zip:443<\/p>\n\n\n\n<p>216.126.231.240:443<\/p>\n\n\n\n<p>8bc5e3bff5150738699927ca2b95f3e3bfd87aed44c30fc61fac788248528579<\/p>\n\n\n\n<p>12f0e9582f0a65984653f75466709743<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>I. Overview According to the monitoring by NSFOCUS, since the beginning of 2024, a new-type botnet family with a high level of anti-tracking awareness&acirc;&euro;&rdquo;XorBot&acirc;&euro;&rdquo;has been continuously updating its versions and introducing new features, undergoing significant changes. This botnet family first emerged in November 2023 and was exclusively disclosed by the NSFOCUS Security Labs in December [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":27487,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[118,869],"class_list":["post-30843","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-botnet","tag-xorbot"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Alert: XorBot Comes Back with Enhanced Tactics - NSFOCUS<\/title>\n<meta name=\"description\" content=\"Discover the resurgence of XorBot, an IoT botnet with enhanced tactics, targeting devices and posing a significant cybersecurity threat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Alert: XorBot Comes Back with Enhanced Tactics - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Discover the resurgence of XorBot, an IoT botnet with enhanced tactics, targeting devices and posing a significant cybersecurity threat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-21T03:00:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/xorbot.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Alert: XorBot Comes Back with Enhanced Tactics - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Discover the resurgence of XorBot, an IoT botnet with enhanced tactics, targeting devices and posing a significant cybersecurity threat.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/xorbot.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Alert: XorBot Comes Back with Enhanced Tactics\",\"datePublished\":\"2024-11-21T03:00:58+00:00\",\"dateModified\":\"2026-04-17T18:07:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/\"},\"wordCount\":1172,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/xorbot.jpg\",\"keywords\":[\"Botnet\",\"xorbot;\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/\",\"name\":\"Alert: XorBot Comes Back with Enhanced Tactics - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/xorbot.jpg\",\"datePublished\":\"2024-11-21T03:00:58+00:00\",\"dateModified\":\"2026-04-17T18:07:36+00:00\",\"description\":\"Discover the resurgence of XorBot, an IoT botnet with enhanced tactics, targeting devices and posing a significant cybersecurity threat.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/xorbot.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/xorbot.jpg\",\"width\":544,\"height\":252,\"caption\":\"Xorbot logo with digital blue background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-xorbot-comes-back-with-enhanced-tactics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alert: XorBot Comes Back with Enhanced Tactics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Alert: XorBot Comes Back with Enhanced Tactics - NSFOCUS","description":"Discover the resurgence of XorBot, an IoT botnet with enhanced tactics, targeting devices and posing a significant cybersecurity threat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/","og_locale":"pt_BR","og_type":"article","og_title":"Alert: XorBot Comes Back with Enhanced Tactics - NSFOCUS","og_description":"Discover the resurgence of XorBot, an IoT botnet with enhanced tactics, targeting devices and posing a significant cybersecurity threat.","og_url":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/","og_site_name":"NSFOCUS","article_published_time":"2024-11-21T03:00:58+00:00","article_modified_time":"2026-04-17T18:07:36+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/xorbot.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Alert: XorBot Comes Back with Enhanced Tactics - NSFOCUS","twitter_description":"Discover the resurgence of XorBot, an IoT botnet with enhanced tactics, targeting devices and posing a significant cybersecurity threat.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/xorbot.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Alert: XorBot Comes Back with Enhanced Tactics","datePublished":"2024-11-21T03:00:58+00:00","dateModified":"2026-04-17T18:07:36+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/"},"wordCount":1172,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/xorbot.jpg","keywords":["Botnet","xorbot;"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/","url":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/","name":"Alert: XorBot Comes Back with Enhanced Tactics - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/xorbot.jpg","datePublished":"2024-11-21T03:00:58+00:00","dateModified":"2026-04-17T18:07:36+00:00","description":"Discover the resurgence of XorBot, an IoT botnet with enhanced tactics, targeting devices and posing a significant cybersecurity threat.","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/xorbot.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/xorbot.jpg","width":544,"height":252,"caption":"Xorbot logo with digital blue background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/alert-xorbot-comes-back-with-enhanced-tactics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Alert: XorBot Comes Back with Enhanced Tactics"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/30843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=30843"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/30843\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/27487"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=30843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=30843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=30843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}