Botnets

The list provided below is meant to provide an overview of the most prevalent Botnet variants currently impacting US victims. This page is updated regularly with new information as it becomes available.

A

Adylkuzz

LEARN MORE +

Aidra Botnet

LEARN MORE +

Amnesia

LEARN MORE +

B

Bashlite

LEARN MORE +

Bondnet

LEARN MORE +

Brain Food

LEARN MORE +

BrickerBot

LEARN MORE +

C

Cutwail

LEARN MORE +

D

DarkSky

LEARN MORE +

DDG

LEARN MORE +

DeltaCharlie

LEARN MORE +

DoubleDoor

LEARN MORE +

F

Fast Flux

LEARN MORE +

Flusihoc

LEARN MORE +

FritzFrog P2P

Learn More

H

Hajime Botnet

LEARN MORE +

Hide 'N Seek

LEARN MORE +

I

Imeij

LEARN MORE +

J

JenX

LEARN MORE +

K

Kelihos

LEARN MORE +

L

Leet

LEARN MORE +

Linux/IRCTelnet

LEARN MORE +

Linux/Moose

LEARN MORE +

Linux.Proxy.10

LEARN MORE +

Linux.ProxyM

LEARN MORE +

M

Masuta

LEARN MORE +

Methbot

LEARN MORE +

Mirai

LEARN MORE +

MrBlack

LEARN MORE +

N

Necurs

LEARN MORE +

P

Persirai

LEARN MORE +

PyCryptoMiner

LEARN MORE +

R

Rakos

LEARN MORE +

Reaper

LEARN MORE +

RouteX

LEARN MORE +

S

Sathurbot

LEARN MORE +

Satori

LEARN MORE +

Smominru

LEARN MORE +

SoakSoak

LEARN MORE +

SquirtDanger

LEARN MORE +

Stantinko

LEARN MORE +

Star Wars

LEARN MORE +

T

TheMoon Botnet

LEARN MORE +

Tofsee

LEARN MORE +

Ttint

LEARN MORE +

V

VPNFilter

LEARN MORE +

W

WireX

LEARN MORE +

Z

Zyklon

LEARN MORE +

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.