Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Mylobot (Botnet) – Malware

June 30, 2023
Reading Time: 3 mins read
in Malware, Types of Malware
Name Lokibot
Additional Names TSPY_MYLOBOT.A
Type of Malware Botnet
Date of Initial Activity 2017
Motivation Stolen banking information, passwords, identity theft, victim’s computer added to a botnet.
Attack Vectors Infected email attachments, malicious online advertisements, social engineering, software cracks.
Targeted System Windows
Associated Groups APT28

Overview

Mylobot is a sophisticated botnet that first detected in 2017 and is equipped with complex evasion techniques including anti-VM, anti-sandbox, and anti-debugging techniques. The botnet allows an attacker to take complete control of the user’s system, downloading any additional payload from its C&C.

Targets

Attacked regular people.

Tools/ Techniques Used

MyloBot is a high-risk trojan-type virus that allows cyber criminals to control the infected machine. MyloBot can be considered as a botnet, since all infected computers are connected to a single network.

Immediately after infiltration, MyloBot scans the “Application Data” folder to check for other malware infiltration and whether the software is running. If found, the malware is immediately terminated and deleted.

MyloBot probably does this to fight competition – multiple viruses might interfere and affect the behavior and efficiency of the infiltrating software. Ultimately, this could lead to inaccuracies and unexpected computing results. Therefore, criminals aim to take over the computer exclusively.

As mentioned above, the presence of the MyloBot might lead to various problems, depending on the developer. Cyber criminals generate revenue by selling traffic. The entire botnet (infected machines) can be used to perform various connections. For example, criminals can increase website traffic by forcing infected computers to visit certain URLs. The botnet can also be used to perform DDoS attacks.

Infected computers can be used to perform many unwanted tasks such as this.

Impact / Significant Attacks

In 2022, MyloBot botnet has been used to deploy malicious payloads to send extortion emails, demanding victims pay $2,732 in bitcoins. BitSight is currently seeing more than 50,000 unique infected systems every day (2023),” down from a high of 250,000 unique hosts in 2020.

References

  1. MyloBot 2022: A botnet that only sends extortion emails
  2. Who’s Behind the Botnet-Based Service BHProxies?
  3. MyloBot Uses Sophisticated Evasion and Attack Techniques, Deletes Other Malware
  4. Removing MyloBot malware from the operating system
Tags: anti-sandboxanti-VMBotnetCyberattackCybersecurityEmailsMalwaremalware nameMyloBotRussiaTSPY_MYLOBOT.AVulnerabilitiesWindows
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial