<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Long list of IP addresses attacking a phpBB forum in May 2025</title>
	<atom:link href="http://billauer.se/blog/2025/05/phpbb-attack-bots-ip-addresses/feed/" rel="self" type="application/rss+xml" />
	<link>https://billauer.se/blog/2025/05/phpbb-attack-bots-ip-addresses/</link>
	<description>Anything I found worthy to write down.</description>
	<lastBuildDate>Thu, 26 Mar 2026 13:15:15 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1.2</generator>
	<item>
		<title>By: SeeM</title>
		<link>https://billauer.se/blog/2025/05/phpbb-attack-bots-ip-addresses/comment-page-1/#comment-1882</link>
		<dc:creator>SeeM</dc:creator>
		<pubDate>Fri, 06 Mar 2026 03:48:03 +0000</pubDate>
		<guid isPermaLink="false">https://billauer.se/blog/?p=7156#comment-1882</guid>
		<description>Hi.

Nice try indeed. (-: Those are likely bots working on datasets for big AI models. They ignore every http status code You throw on them. You can try https://github.com/TecharoHQ/anubis , or https://iocaine.madhouse-project.org/ , which are turning costs of running the botnet on the botnet itself, rather then on Your servers.</description>
		<content:encoded><![CDATA[<p>Hi.</p>
<p>Nice try indeed. (-: Those are likely bots working on datasets for big AI models. They ignore every http status code You throw on them. You can try <a href="https://github.com/TecharoHQ/anubis" rel="nofollow">https://github.com/TecharoHQ/anubis</a> , or <a href="https://iocaine.madhouse-project.org/" rel="nofollow">https://iocaine.madhouse-project.org/</a> , which are turning costs of running the botnet on the botnet itself, rather then on Your servers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Web Admin 1</title>
		<link>https://billauer.se/blog/2025/05/phpbb-attack-bots-ip-addresses/comment-page-1/#comment-1847</link>
		<dc:creator>Web Admin 1</dc:creator>
		<pubDate>Sun, 03 Aug 2025 17:51:05 +0000</pubDate>
		<guid isPermaLink="false">https://billauer.se/blog/?p=7156#comment-1847</guid>
		<description>Most likely a variant of this bot net

https://asec.ahnlab.com/en/89083/

About screenshots and UIs:

The screenshots of SVF in the ASEC article depict the Discord-based C2 interface, typical of recent Discord-abusing malware but dissimilar to the classic minimalist CLI/IRC UIs in Mirai and Gafgyt. Graphical or web dashboard control is uncommon in classic botnet code but growing in “commodity” botnet marketing.

Distinctive aspects:

SVF is not a direct clone of any particular existing botnet, but combines traits found in:

    Mirai (infection method, DDoS focus)

    Mozi and XorDDoS (modular Python, Linux/SSH targeting)

    Newer Discord-controlled malware (communication channel and group management)

No attribution to a famous family:

While SVF reuses common attack chains and open-source libraries (like discord.py), it is not explicitly identified as a variant or renamed version of Mirai, Gafgyt, or Mozi in current threat intelligence. The Discord C2 and proxy automation are relatively novel combinations for Linux DDoS botnets as of mid-2025

.

Conclusion:

SVF botnet’s architecture and screenshots are most similar to new-generation, modular Linux DDoS botnets (e.g., Mozi, Python-based IRC/Discord bots) but are unique in integrating Discord C2 and proxy-scraping in a Linux brute-force SSH campaign. It does not entirely clone any single previous botnet but instead blends several established techniques into a new package</description>
		<content:encoded><![CDATA[<p>Most likely a variant of this bot net</p>
<p><a href="https://asec.ahnlab.com/en/89083/" rel="nofollow">https://asec.ahnlab.com/en/89083/</a></p>
<p>About screenshots and UIs:</p>
<p>The screenshots of SVF in the ASEC article depict the Discord-based C2 interface, typical of recent Discord-abusing malware but dissimilar to the classic minimalist CLI/IRC UIs in Mirai and Gafgyt. Graphical or web dashboard control is uncommon in classic botnet code but growing in “commodity” botnet marketing.</p>
<p>Distinctive aspects:</p>
<p>SVF is not a direct clone of any particular existing botnet, but combines traits found in:</p>
<p>    Mirai (infection method, DDoS focus)</p>
<p>    Mozi and XorDDoS (modular Python, Linux/SSH targeting)</p>
<p>    Newer Discord-controlled malware (communication channel and group management)</p>
<p>No attribution to a famous family:</p>
<p>While SVF reuses common attack chains and open-source libraries (like discord.py), it is not explicitly identified as a variant or renamed version of Mirai, Gafgyt, or Mozi in current threat intelligence. The Discord C2 and proxy automation are relatively novel combinations for Linux DDoS botnets as of mid-2025</p>
<p>.</p>
<p>Conclusion:</p>
<p>SVF botnet’s architecture and screenshots are most similar to new-generation, modular Linux DDoS botnets (e.g., Mozi, Python-based IRC/Discord bots) but are unique in integrating Discord C2 and proxy-scraping in a Linux brute-force SSH campaign. It does not entirely clone any single previous botnet but instead blends several established techniques into a new package</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Santeri</title>
		<link>https://billauer.se/blog/2025/05/phpbb-attack-bots-ip-addresses/comment-page-1/#comment-1839</link>
		<dc:creator>Santeri</dc:creator>
		<pubDate>Mon, 09 Jun 2025 05:35:12 +0000</pubDate>
		<guid isPermaLink="false">https://billauer.se/blog/?p=7156#comment-1839</guid>
		<description>Blocking IPs in firewall is likely to cause colleteral damage and is laborious unless you automate it in which case it will cause even more collateral damage. As the deny list grows, it will also start slowing the system. My forum is getting currently over 9000 requests per minute and I found a way to disconnect them all before they reach phpBB and overload database server.</description>
		<content:encoded><![CDATA[<p>Blocking IPs in firewall is likely to cause colleteral damage and is laborious unless you automate it in which case it will cause even more collateral damage. As the deny list grows, it will also start slowing the system. My forum is getting currently over 9000 requests per minute and I found a way to disconnect them all before they reach phpBB and overload database server.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
