Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

DDoS-for-Hire Operation Exposed: How an Operator's Debug Build Unraveled a Commercial Game-Server Botnet

0
Medium
Published: Wed Apr 29 2026 (04/29/2026, 19:42:01 UTC)
Source: AlienVault OTX General

Description

An exposed open directory on a Netherlands-hosted server revealed the complete operational toolkit of xlabs_v1, a Mirai-derived IoT botnet operated by an actor using the handle Tadashi. The operation provides DDoS-for-hire services specifically targeting game servers and Minecraft hosts through 21 distinct flood attack variants. The botnet exploits Android Debug Bridge (ADB) on TCP/5555 to compromise over 4 million potentially vulnerable IoT devices including Android TV boxes, smart TVs, and routers. The operation features bandwidth profiling to price-tier infected devices, ChaCha20 string encryption with cryptographic weaknesses, and competitor-eradication routines. Infrastructure analysis consolidated the entire operation within a single bulletproof /24 netblock in the Netherlands, with co-located cryptojacking infrastructure also identified.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/30/2026, 08:06:35 UTC

Technical Analysis

An open directory on a server in the Netherlands exposed the full operational toolkit of xlabs_v1, a Mirai-derived IoT botnet operated by the adversary Tadashi. This botnet provides commercial DDoS-for-hire services specifically targeting game servers and Minecraft hosts through 21 distinct flood attack variants. It compromises over 4 million IoT devices by exploiting the Android Debug Bridge (ADB) service listening on TCP port 5555, affecting devices such as Android TV boxes, smart TVs, and routers. The botnet features bandwidth profiling to tier infected devices for pricing, employs ChaCha20 encryption with cryptographic weaknesses, and includes routines to remove competing malware. The entire operation is hosted within a single bulletproof /24 netblock in the Netherlands, which also contains cryptojacking infrastructure. There is no indication of official patches or fixes, and no known exploits in the wild have been reported.

Potential Impact

The botnet enables attackers to launch distributed denial-of-service (DDoS) attacks against game servers and Minecraft hosts, potentially disrupting service availability. By compromising over 4 million IoT devices, it leverages significant scale for attacks. The exploitation of ADB on TCP/5555 indicates that devices with exposed or unsecured ADB services are at risk. The use of weak encryption and competitor-eradication routines suggests ongoing attempts to maintain control over infected devices and maximize botnet effectiveness. The presence of cryptojacking infrastructure alongside the botnet indicates additional malicious activity on the same infrastructure.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since the botnet exploits exposed Android Debug Bridge (ADB) services on TCP port 5555, it is recommended to disable or secure ADB on IoT devices and ensure that these devices are not exposed to the internet without proper access controls. Network administrators should block or monitor traffic to TCP port 5555 where possible. Given the lack of an official fix and the scale of infected devices, device owners should verify firmware updates from device manufacturers and apply them if available. Monitoring for unusual outbound traffic patterns consistent with DDoS activity may help detect infections. No urgent patch is currently available, so mitigation focuses on reducing exposure and securing vulnerable devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://hunt.io/blog/xlabs-v1-ddos-for-hire-operation-exposed"]
Adversary
Tadashi
Pulse Id
69f25f09e5c3a33611f7cb16
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip176.65.139.134
ip176.65.139.9
ip176.65.139.44
ip176.65.139.42

Hash

ValueDescriptionCopy
hashf962cb443975065b91d4512a42a529a091726e1815be28ced0ebb9dff997931d
hasha03705fc225dbcec7e3c2f06a258afe81b5d88aaff1368d10dd6ba4f0932be7c
hash5c3468e3c7a535b74fa91927fb1572d8
hash78774672884f8cd7593fced3c7d1faa4
hashfac068afc5a0361f323f8b2fdbcbfd41
hash98182f78f2ee76f3dffa58c268dd9e653c711ce5
hashda365650e77eaf9d79801d475de7bf2b2a031251
hashdbcf1c93634010c7e6131bcdfffa72e30da2376a
hash079ae4f813939dd96b961ae288fb7f930649dfebb4884c13af95309a71f986f5
hash31a60f9e0b5b4f0371f4130a184e27f79cefacb080a6273ccb1c9a908dc6ca9d
hash8367daa8ce633724157b8edd21d625de5ac56b8c2d983bbb283836162037f3c1
hashfa965ed784f7ec99e21475205cc177bb71ac7550b4015b4a4b3e232f032dcb91

Threat ID: 69f309facbff5d8610a1979e

Added to database: 4/30/2026, 7:51:22 AM

Last enriched: 4/30/2026, 8:06:35 AM

Last updated: 4/30/2026, 9:57:49 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses