Article Details

Scrape Timestamp (UTC): 2025-05-16 11:37:37.094

Source: https://thehackernews.com/2025/05/new-httpbot-botnet-launches-200.html

Original Article Text

Click to Toggle View

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors. Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational institutions in China. "Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks," NSFOCUS said in a report published this week. "By employing highly simulated HTTP Flood attacks and dynamic feature obfuscation techniques, it circumvents traditional rule-based detection mechanisms." HTTPBot, first spotted in the wild in August 2024, gets its name from the use of HTTP protocols to launch distributed denial-of-service attacks. Written in Golang, it's something of an anomaly given its targeting of Windows systems. The Windows-based botnet trojan is noteworthy for its use in precisely targeted attacks aimed at high-value business interfaces such as game login and payment systems. "This attack with 'scalpel-like' precision poses a systemic threat to industries that rely on real-time interaction," the Beijing-headquartered company said. "HTTPBot marks a paradigm shift in DDoS attacks, moving from 'indiscriminate traffic suppression' to 'high-precision business strangulation.'" HTTPBot is estimated to have issued no less than 200 attack instructions since the start of April 2025, with the attacks designed to strike the gaming industry, technology companies, educational institutions, and tourism portals in China. Once installed and run, the malware conceals its graphical user interface (GUI) to sidestep process monitoring by both users and security tools in an effort to increase the stealthiness of the attacks. It also resorts to unauthorized Windows Registry manipulation to ensure that it's run automatically on system startup. The botnet malware then proceeds to establish contact with a command-and-control (C2) server to await further instructions to execute HTTP flood attacks against specific targets by sending a high volume of HTTP requests. It supports various attack modules - "DDoS Botnet families tend to congregate on Linux and IoT platforms," NSFOCUS said. "However, the HTTPBot Botnet family has specifically targeted the Windows platform." "By deeply simulating protocol layers and mimicking legitimate browser behavior, HTTPBot bypasses defenses that rely on protocol integrity. It also continuously occupies server session resources through randomized URL paths and cookie replenishment mechanisms, rather than relying on sheer traffic volume."

Daily Brief Summary

DDOS // HTTPBot Botnet Targets Gaming, Tech with Precision DDoS Attacks

New botnet malware, HTTPBot, has been actively targeting the gaming and technology sectors, specifically in China.

HTTPBot, which operates on Windows systems, employs HTTP protocols to execute targeted distributed denial-of-service (DDoS) attacks.

By using dynamic feature obfuscation and HTTP Flood attacks, HTTPBot avoids detection by traditional rule-based security systems.

Since April 2025, HTTPBot has orchestrated over 200 precise attack commands against key business areas, particularly affecting game login and payment platforms.

The malware conceals its operations by hiding its graphical user interface and manipulating the Windows Registry to run at system startup.

HTTPBot communicates with a command-and-control server to receive instructions for launching high-volume HTTP request attacks to disrupt specific target operations.

The botnet is designed to occupy server resources through complex URL paths and cookie mechanisms, setting it apart from typical DDoS attacks focused on overwhelming traffic volume.

This emergence of HTTPBot signifies a strategic shift in DDoS tactics from broad traffic disruption to targeted business disruption.