When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
To compromise these endpoints, a custom malware was written, the researchers further explained.
For different types of devices, the botnet has different clusters.
Other clusters include xlogin, alogin, axlogin, and zylogin.
Some clusters are relatively large, counting thousands of assimilated devices.
Others are smaller, counting as little as two infections.
Besides expanding, the botnet also improved in terms of communications and obfuscation.
Apparently, it is a lot better when it comes to evading detection, as well as operational effectiveness.
ViaBleepingComputer