A new botnet called Udados is making waves in the Technology and Telecommunications world, hitting companies with relentless HTTP flood DDoS attacks. The folks at ANY.RUN took a close look and found that Udados uses hijacked systems to blast targeted servers with a crazy amount of fake-but-legit HTTP traffic. The goal, Overwhelm and disrupt take business operations offline, plain and simple. What makes it even nastier is how well it hides. Udados mixes its attack traffic in with normal web activity, which throws off defenders and makes it much harder to spot or block. Once Udados infects a machine, it keeps in touch with a Command and Control (C2) server, sending regular updates in neat JSON packets. These updates include things like user ID, bot version, privilege level, and what the infected system is currently doing. This helps the people running the botnet keep tabs on their army and coordinate attacks. When the C2 wants to strike, it sends out commands—especially one called !httppost. That command fires up the DDoS module, telling the bot how long to attack, how many threads to use, and even includes a Base64 payload stuffed with random data to make the attack traffic look just like normal HTTP POST requests. The whole operation runs out of Autonomous System AS214943, known as RAILNET, which has picked up a reputation for shady activity. By late 2025, it had connections to over 30 different malware families, including big names like Remcos and Amadey. The main C2 server for Udados sits at 178[.]16[.]54[.]87 and talks through the URI /uda/ph.php—a dead giveaway if you see it. Security teams should keep an eye on outbound HTTP traffic for that path, watch for JSON parameters like uid, st, msg, and tid, and look out for sudden spikes in outgoing traffic. That’s often the first sign a DDoS attack is about to hit.
Singapore’s Cyber Security Agency (CSA) has released an urgent alert warning organizations about a critical vulnerability in SmarterTools’ SmarterMail email server software, tr...
A threat actor known as Crypt4You has begun advertising a new offensive tool dubbed VOID KILLER on underground forums and dark web marketplaces. Unlike traditional crypters that si...
A critical vulnerability (CVE-2025-47411) in Apache StreamPipes has been disclosed that allows a non-administrator user to escalate privileges and gain full administrative control....