The Rise of DDoS-for-Hire Botnets: Inside the Masjesu Threat Model

Summary:

Masjesu, also known as XorBot, is an emerging stealth-focused botnet operating as a DDoS-for-hire service, targeting vulnerable IoT devices such as routers, cameras, and network gateways across multiple architectures. Designed for persistence and low visibility, the botnet avoids high-profile targeting while steadily expanding its global footprint through encrypted communications, self-propagation, and exploitation of multiple vulnerabilities.

The botnet enables attackers to launch large-scale volumetric DDoS attacks against enterprises, content delivery networks, and gaming platforms. Its evolution reflects the growing commercialization of cybercrime, persistent weaknesses in IoT ecosystems, and the urgent need for organizations to strengthen device security, monitoring, and network defences.

Technical Description:

Masjesu is a multi-architecture IoT botnet that gains initial access through a range of command injection and remote code execution vulnerabilities affecting devices from vendors such as D-Link, TP-Link, and Realtek. Once executed, the malware attempts to bind to a predefined TCP port (55988) to establish a direct communication channel with attackers, terminating execution if unsuccessful.

Persistence is achieved by ignoring termination signals, suppressing competing processes such as wget and curl, and maintaining continuous communication with command-and-control infrastructure using XOR-based obfuscation for configuration data and payloads.

The botnet also incorporates self-propagation capabilities by scanning random IP ranges for exposed services, particularly targeting ports associated with known vulnerabilities. Infected devices respond to commands by executing various DDoS flooding techniques, forming a distributed and resilient attack infrastructure optimized for stealth, scalability, and long-term operation. The details and technicalities of the attack campaign are discussed further,

Delivery and Infection Chain:

Masjesu spreads by exploiting exposed IoT services, particularly vulnerabilities in routers, DVRs, NVRs, and IP cameras. It continuously scans the internet for devices with open management interfaces or service ports such as 23, 80, and 52869, gaining access through command injection or remote code execution techniques.

The Infection chain was identified as follows,

  • The botnet scans random IP ranges to identify IoT devices with exposed services and vulnerable configurations
  • Command injection or remote code execution vulnerabilities are exploited to execute the malicious payload
  • The malware attempts to bind to a predefined TCP port (55988) to establish a control channel, terminating if unsuccessful
  • Persistence is established by suppressing competing processes and maintaining communication with the command-and-control infrastructure
  • The compromised device joins the botnet, executes DDoS commands when instructed, and scans for additional vulnerable devices to propagate further.

Technical Capabilities:

Masjesu demonstrates strong capabilities in persistence, evasion, and distributed attack execution. As a multi-architecture malware, it can infect a wide range of IoT devices, enabling large-scale botnet formation. The use of XOR-based obfuscation conceals configuration data and payloads, complicating detection and analysis.

The malware ensures persistence by binding to a dedicated communication port, ignoring termination signals, and actively suppressing competing malware or system processes. Its self-propagation capability allows rapid expansion by scanning and exploiting vulnerable devices without external coordination.

Infected nodes can execute multiple volumetric DDoS attack techniques under command-and-control direction. This results in a geographically distributed attack network that is highly resilient, difficult to detect, and capable of sustaining prolonged attack campaigns.

Attribution and Evolution:

Masjesu has been active since at least 2023 and is linked to an operator identified as “synmaestro.” Initially identified by security researchers, the botnet has evolved significantly by expanding its exploit capabilities and improving evasion techniques.

It has transitioned into a commercial DDoS-for-hire service, actively promoted through platforms such as Telegram. This evolution highlights a broader trend toward the professionalization and monetization of cybercrime, where sophisticated attack capabilities are increasingly offered as accessible services.

Active Campaign and Geographic Spread:

Current activity indicates a globally distributed botnet, with significant concentrations of infected devices and attack traffic originating from regions such as Vietnam, Ukraine, Iran, Brazil, Kenya, and India. A notable portion of activity has been observed in Vietnam.

The decentralized nature of the botnet, combined with the use of compromised IoT devices, enables geographically diverse attack traffic. This distribution increases the effectiveness of DDoS campaigns and complicates mitigation efforts for targeted organizations.

Conclusion:

Masjesu represents the next generation of IoT botnets, characterized by stealth, adaptability, and commercial intent. Its ability to combine low-detection techniques, self-propagation, and multi-platform targeting highlights ongoing weaknesses in IoT security.

Organizations must adopt proactive security measures, including device hardening, network segmentation, continuous monitoring, and timely patching, to mitigate the growing threat of botnet-driven DDoS attacks.

Impact:

Masjesu enables large-scale DDoS attacks that can disrupt operations, degrade service availability, and impact customer experience. Enterprises, content delivery networks, and online platforms are particularly at risk.

The botnet’s persistence and ability to evade detection increase its operational lifespan, while its reliance on widely deployed IoT devices amplifies its scale. The commercialization of such capabilities lowers the barrier to entry for attackers, significantly increasing the overall threat landscape.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Persistence, Command and Control, Impact
Technique Name Exploit Public-Facing Application, Command Injection, Remote Code Execution, Botnet Communication
Sub Technique Name Exploitation of IoT vulnerabilities, TCP port binding (55988), XOR-encrypted C2 communication, Process termination/suppression
Attack Type Distributed Denial-of-Service (DDoS), Botnet Propagation
Targeted Applications IoT devices, gaming servers, enterprise services
Region Impacted Global
Industry Impacted Telecommunications, Technology, Gaming, Cloud/CDN providers, Enterprise networks
IOC’s SHA-1 Hash:
84791db42a6f321ea70cfcbf13913fa4e02533f8
8ba1f42c61e1bef97afb48b1e741c889cc0cad50
c72cd784e908c2026549be7439418f7d126936b9
83bb15de9ff6d7501897689e97907fe80f329604
339c5f229ae62f7139bf7de6f8c6ab136213e8c1
6136fe4df8c0cce502d50671def6b6bc2850a38d
95a5ff1372f352434525a416570eef4379ebac19
d0e08fb6d967a2301f0dd942f5fcacd3a27e42c6
ada6c6646cc86e12a09355944700debf8abd2a55

SHA-256 Hash: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Domains:
conn[.]masjesu[.]zip
Gpbtpz[.]rodeo
conn[.]elbbird[.]zip
starlight[.]fans
satanshop[.]net
conn[.]f12screenshot[.]xyz

IP Addresses:
158[.]94[.]208[.]122:443
178[.]16[.]54[.]252:443
192[.]168[.]5[.]220:443
199.232.46.132
5.42.78.100
78.138.130.114
85.192.37.173
5.181.159.78
217.18.63.132
CVE NA

Recommended Actions:

  • Regularly update and patch IoT devices, routers, and network equipment to address known vulnerabilities
  • Disable unnecessary services and close unused ports, particularly exposed remote management interfaces
  • Replace default credentials with strong, unique passwords across all IoT devices
  • Implement network segmentation to isolate IoT devices from critical systems and limit lateral movement
  • Monitor network traffic for unusual patterns such as unknown outbound connections or traffic spikes
  • Deploy intrusion detection and prevention systems to identify exploitation attempts and command-and-control communication
  • Restrict outbound connections to suspicious destinations and enforce strict firewall rules
  • Conduct regular vulnerability assessments and maintain an inventory of all IoT assets within the network.

Reference:

https://www.trellix.com/blogs/research/masjesu-rising-stealth-iot-botnet-ddos-evasion/

https://rewterz.com/threat-advisory/matrix-botnet-targets-iot-devices-for-global-ddos-attacks-active-iocs