A modern server room featuring network equipment with blue illumination. Ideal for technology themes.
Intelligence

Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the.
Sami Malik
Copywriter

What Happened

Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Eng

This intelligence was reported by AlienVault OTX on 2026-05-11. The activity is associated with the following threat categories: source engine, honeypot analysis, vietnam infrastructure, game servers, win_sys.exe, opportunistic attacks.

Why This Matters

Threats of this type affect organisations that rely on internet-facing infrastructure, cloud services, or employee-facing authentication systems. The window between public disclosure and active exploitation in production environments has narrowed significantly. Security teams that wait more than 48 hours to review new campaigns routinely find themselves responding to incidents that were preventable.

Knowing your organisation's attack surface is the first line of defence. You cannot protect assets you have not mapped.

Who Is at Risk

Organisations running internet-facing services in financial services, critical infrastructure, and enterprise software are the primary targets in campaigns of this type. The techniques involved are not industry-specific. Any organisation with exposed authentication endpoints or unmonitored external assets is a viable target. The threat categories here (source engine, honeypot analysis, vietnam infrastructure, game servers, win_sys.exe, opportunistic attacks) are among the most active in the current landscape.

indicators of compromise

If you are investigating whether your environment may be affected, the following indicators of compromise have been identified:

  • IPv4: 45.148.10.212
  • IPv4: 103.177.110.202
  • IPv4: 94.154.172.43
  • CVE: CVE-2025-32975
  • FileHash-MD5: 1fc0a876a121882ffaad6677f444cf5b
  • FileHash-SHA1: ea690c3acfa6592c601e4b5dd6122805063bac53

What to Do Now

  • Review your external attack surface. Identify assets matching the target profile: exposed authentication endpoints, unpatched services, or credentials that may have been previously exposed.
  • Search for the indicators listed above in endpoint logs, network traffic, and SIEM alerts. A match warrants immediate investigation.
  • Update detection rules in your SIEM and EDR for the specific file hashes, IP addresses, or behavioural patterns identified in this campaign.
  • Validate your incident response playbook covers the threat categories involved. Exercises built on real campaigns outperform generic scenarios.

Frequently Asked Questions

How do I know if my organisation has been affected?

Start with the indicators of compromise above. Run them against your endpoint detection tools, firewall logs, and SIEM. If you find a match, isolate the affected system immediately before taking further action. No matches does not confirm you are unaffected: it means the known indicators were not found. Behavioural analysis and threat hunting are the next steps.

What is the fastest way to reduce exposure to this type of threat?

Close exposed services that should not be publicly reachable, rotate credentials that may have been compromised, and enforce MFA on all external-facing authentication. These steps take hours, not weeks, and reduce exposure across a wide range of active campaigns.

Is this relevant for organisations outside the sectors mentioned?

Yes. The threat categories involved (source engine, honeypot analysis, vietnam infrastructure, game servers, win_sys.exe, opportunistic attacks) are general-purpose techniques reused across industries. Any organisation that has not reviewed its defences against these specific categories in the past 90 days should treat this as a prompt to do so.

How often should we review new threat intelligence?

Campaigns that are new today are actively exploiting vulnerable organisations within 24 to 72 hours of public disclosure. Weekly reviews are the minimum. Automated monitoring that surfaces new campaigns in real time gives your team the lead time needed to act before exploitation begins.

About the author
Sami Malik is a copywriter passionate about crafting clear, engaging, and impactful content that helps brands connect with their audience through storytelling and strategy.

Related Articles

Discover simplified
Cyber Risk Management
Request access and learn how we can help you prevent cyberattacks proactively.