Experts have traced its development back to at least 2006, with strong evidence suggesting it was developed in China for Chinese users. It has evolved over time, with its code occasionally being integrated into more sophisticated malware like the SoulSearcher backdoor .
It is most notorious for HTTP GET Flooding , a technique that exhausts a target's web server resources by overwhelming it with legitimate-looking application requests.
Older versions included features common to RATs, such as: Bypassing specific firewalls. Encrypting all sent traffic to evade detection. Keylogging capabilities to steal sensitive information. Role in Cyber Operations
Attacker: Netbot
Experts have traced its development back to at least 2006, with strong evidence suggesting it was developed in China for Chinese users. It has evolved over time, with its code occasionally being integrated into more sophisticated malware like the SoulSearcher backdoor .
It is most notorious for HTTP GET Flooding , a technique that exhausts a target's web server resources by overwhelming it with legitimate-looking application requests.
Older versions included features common to RATs, such as: Bypassing specific firewalls. Encrypting all sent traffic to evade detection. Keylogging capabilities to steal sensitive information. Role in Cyber Operations