Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
May 14, 2026
Home/Threats/SystemBC Botnet Hijacked 10,000 Devices Worldwide to Use for DDoS
Threats

SystemBC Botnet Hijacked 10,000 Devices Worldwide to Use for DDoS

The SystemBC malware family has escalated into a significant global threat. First documented in 2019, this persistent malware now forms a massive botnet infrastructure, controlling over 10,000...

Emy Elsamnoudy
Emy Elsamnoudy
February 4, 2026 3 Min Read
4 0

The SystemBC malware family has escalated into a significant global threat. First documented in 2019, this persistent malware now forms a massive botnet infrastructure, controlling over 10,000 hijacked devices worldwide.

Functioning primarily as a SOCKS5 proxy and a backdoor, this malware enables threat actors to mask their malicious traffic and maintain long-term access to compromised networks.

By converting infected systems into relays, the botnet allows attackers to route command-and-control communications through victim machines, effectively hiding their true location from defenders and complicating attribution efforts.

This “backconnect” architecture creates a resilient network that has survived significant law enforcement disruptions, including Europol’s Operation Endgame in May 2024.

Rather than disappearing, the infrastructure has adapted, shifting its focus toward compromising hosting providers instead of residential networks.

Simple map of SystemBC’s network traffic (Source - Silent Push)
Simple map of SystemBC’s network traffic (Source – Silent Push)

This strategic pivot allows infections to persist significantly longer than typical malware campaigns, with the average system remaining compromised for 38 days and some infections lasting over 100 days.

The botnet serves as a critical precursor to ransomware deployments, tunneling traffic for data theft and further exploitation.

Silent Push analysts noted that the botnet’s resurgence involves sophisticated tracking of infected IP addresses across the globe.

Global distribution of IP addresses map (Source - Silent Push)
Global distribution of IP addresses map (Source – Silent Push)

Their research identified the United States as the primary target, hosting more than 4,300 compromised devices, followed by significant concentrations in Germany, France, and Singapore.

Investigations also revealed alarming breaches within sensitive government environments, including high-density servers hosting official websites in Vietnam and Burkina Faso.

These compromised assets are frequently leveraged to launch additional attacks or support other criminal operations.

Undetected Perl Variant Analysis

A critical aspect of this campaign is the discovery of a previously undocumented SystemBC variant written in Perl, designed specifically to evade traditional security controls.

Files communicating with the botnet’s command infrastructure included this unusual script, which initially registered zero detections across major antivirus engines.

This variant is typically deployed by ELF binary droppers, identified as “SafeObject” and “StringHash,” which use UPX packing to conceal their malicious code from static analysis tools.

SystemBC Perl variant (Source - Silent Push)
SystemBC Perl variant (Source – Silent Push)

Once unpacked, these droppers aggressively hunt for writable directories on the host system before executing hundreds of embedded payloads.

The investigation into the dropper code revealed it is unusually “noisy” and filled with Russian-language strings, offering a potential clue regarding the threat actor’s origins.

Since SystemBC infrastructure often signals the early stages of an intrusion chain, security teams are recommended to prioritize proactive monitoring of these indicators to prevent the escalation to ransomware.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitMalwareransomwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

False Negatives Are a New SOC Headache. Here’s the Fast Way to

Next Post

PhantomVAI Custom Loader Attacks Users with RunPE Uses Utility

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
node-ipc npm Package Compromised in Supply Weekly Downloads
May 14, 2026
TeamPCP and BreachForums Hackers Running $1,000 Contest for Supply
May 14, 2026
Critical Canon MailSuite Flaw Allows Remote Code Execution
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us