Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Mirai-based xlabs_v1 botnet exploits ADB to hijack IoT devices and launch DDoS attacks

Greg Brockman explains how Elon Musk left OpenAI

Department of Justice says ransomware group exploited Russian government database

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Mirai-based xlabs_v1 botnet exploits ADB to hijack IoT devices and launch DDoS attacks
Identity

Mirai-based xlabs_v1 botnet exploits ADB to hijack IoT devices and launch DDoS attacks

By May 6, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have published a new Mirai-derived botnet that targets internet-exposed devices that self-identify as xlabs_v1 and are running Android Debug Bridge (ADB), allowing them to join the network to perform distributed denial of service (DDoS) attacks.

Hunt.io, which detailed the malware, said it discovered it after identifying a published directory on a server with IP address 176.65.139 hosted in the Netherlands.[.]44 inches that does not require certification.

Hunt.io added that the malware supports “21 flood variants across TCP, UDP, and raw protocols, including RakNet and OpenVPN-style UDP, that can bypass consumer-grade DDoS protections,” and is offered as a DDoS rental service designed to target game servers and Minecraft hosts.

The highlight of xlabs_v1 is that it explores Android devices running ADB services exposed on TCP port 5555. This means Android TV boxes, set-top boxes, smart TVs, and any device that comes with a tool that is enabled by default could be a potential target.

In addition to Android APKs (‘boot.apk’), the malware supports multi-architecture builds covering ARM, MIPS, x86-64, and ARC, indicating that it is also designed to target residential routers and Internet of Things (IoT) hardware.

The result was a dedicated botnet designed to receive attack commands from the operator’s panel (‘xlabslover'[.]lol”) Generates large amounts of junk traffic on demand and directs DDoS attacks, especially against game servers.

“The bot is a statically linked ARMv7, running on stripped Android firmware, and is delivered through an ADB shell paste to /data/local/tmp,” Hunt.io explained. “The operator’s nine-payload list is tailored for Android TV boxes, set-top boxes, smart TVs, and IoT-grade ARM hardware that ships with ADB enabled.”

There is evidence that DDoS rental services feature pricing based on bandwidth. This assessment is based on the presence of bandwidth profiling routines that collect the victim’s bandwidth and geographic location.

This component opens 8,192 parallel TCP sockets to the geographically closest Speedtest server, saturates them for 10 seconds, and reports the measured data transfer rate to the panel. According to Hunt.io, the goal is to assign each compromised device to a price tier for paying customers.

The important aspect to note here is that the botnet exists after transmitting bandwidth information in megabits per second (Mbps). This means that without a persistence mechanism, operators would have to reinfect the device twice through the same ADB exploit channel.

“This bot does not write itself to disk persistence locations, modify init scripts, create systemd units, or register cron jobs,” Hunt.io said. “This design suggests that carriers view bandwidth probing as an infrequent fleet tier update operation rather than a pre-flight check for each attack, and the resulting cycle of egress and reinfection is the design intent.”

xlabs_v1 also has a “killer” subsystem that terminates competitors, allowing it to commandeer the victim device’s entire upstream bandwidth for itself and use it to perform DDoS attacks. It is currently unknown who is behind the malware, but the attacker has been nicknamed “Tadashi” due to the ChaCha20-encrypted strings embedded in all builds of the bot.

Further analysis of the coexisting infrastructure revealed the presence of the VLTRig Monero mining toolkit on host 176.65.139.[.]However, it is currently unclear whether the two activities are the work of the same attacker.

“In commercial crime terms, xlabs_v1 is mid-tier. It’s more sophisticated than the typical script-kiddie Mirai fork.” […]However, it is not as sophisticated as the top tier of commercial DDoS rental operations,” Hunt.io said. “This operator competes on price and attack diversity rather than technological sophistication. It targets consumer IoT devices, home routers, and small game server operators.”

This development comes after Darktrace revealed that an intentionally misconfigured Jenkins instance in a honeypot network was targeted by an unknown attacker to deploy a DDoS botnet downloaded from a remote server (‘103.177.110’).[.]202″), while also taking steps to avoid detection.

“The existence of gaming-specific DoS techniques further highlights that the gaming industry continues to be a widespread target for cyber attackers,” the company said. “This botnet is likely already being used against game servers and serves as a reminder to server operators that appropriate mitigation measures are in place.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGreg Brockman explains how Elon Musk left OpenAI

Related Posts

MuddyWater uses Microsoft Teams to steal credentials in false flag ransomware attack

May 6, 2026

The Hacker News launches “Cybersecurity Stars Awards 2026” — now accepting applications

May 6, 2026

The AI ​​agent is already within the perimeter. Do you know what they do?

May 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Mirai-based xlabs_v1 botnet exploits ADB to hijack IoT devices and launch DDoS attacks

Greg Brockman explains how Elon Musk left OpenAI

Department of Justice says ransomware group exploited Russian government database

DeepSeek could reach $45 billion valuation from first investment round

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.