Cybersecurity researchers have uncovered a new botnet named xlabs_v1, a derivative of the notorious Mirai malware. This botnet targets a wide array of Internet of Things (IoT) and Android devices, including smart TVs, Android TV boxes, and residential routers, that have an exposed Android Debug Bridge (ADB) interface on TCP port 5555. Once compromised, these devices are conscripted into a network used to launch large-scale distributed denial-of-service (DDoS) attacks. The operation is believed to be a DDoS-for-hire service, with evidence suggesting a focus on targeting gaming servers. The malware includes sophisticated features for persistence, evasion, and resource monopolization, and is attributed to an operator using the alias "Tadashi."
The xlabs_v1 botnet spreads by scanning the internet for devices with an open ADB port (5555/TCP). This interface, intended for development purposes, is often left unsecured on consumer-grade IoT devices, creating a large attack surface. The threat actor, identified as "Tadashi," leverages this vulnerability to gain unauthorized access and deploy the malware.
The operation's infrastructure was discovered by researchers at Hunt.io on a server located in the Netherlands (176.65.139.44). This server hosted various compiled versions of the malware for different CPU architectures (ARM, MIPS, x86-64, ARC), enabling the botnet to infect a diverse range of hardware.
The primary purpose of the botnet is to function as a DDoS-for-hire service. This is supported by the inclusion of 21 distinct DDoS attack methods, including specialized floods targeting the RakNet protocol used by Minecraft servers and another designed to mimic OpenVPN traffic. The malware also profiles the bandwidth of each infected device, likely to categorize and price its DDoS capabilities for potential customers.
The xlabs_v1 malware exhibits several characteristics inherited from its Mirai lineage, along with some unique features:
T1190 - Exploit Public-Facing Application: The botnet exploits the publicly accessible and often misconfigured ADB service on IoT devices.T1071.001 - Web Protocols: The bot communicates with its C2 server, xlabslover[.]lol, using encrypted strings. The operator's alias, "Tadashi," is embedded as a ChaCha20-encrypted string.T1036.005 - Match Legitimate Name or Location: After infection, the malware renames its process to a common system name like /bin/bash to avoid suspicion.T1057 - Process Discovery: The malware includes a "killer" module that scans for and terminates processes belonging to competing malware or security tools, ensuring it has exclusive control of the device's resources.T1498 - Network Denial of Service: The botnet's primary function is to launch various types of DDoS flood attacks against specified targets.A co-located host (176.65.139.42) was found to be hosting a VLTRig Monero-mining toolkit, though a direct link to the xlabs_v1 operator has not been confirmed. This could indicate either a separate operation or an additional monetization stream for the same actor.
The proliferation of the xlabs_v1 botnet poses a significant threat to internet stability and service availability. For owners of compromised IoT devices, the impact includes degraded performance, increased bandwidth consumption, and the potential for their devices to be used in illegal activities. For the targets of the DDoS attacks, the impact can be severe, leading to service outages, financial loss, and reputational damage. The gaming industry, particularly operators of Minecraft servers, appears to be a primary target, but the botnet's capabilities can be directed at any online service. The DDoS-for-hire model lowers the barrier to entry for malicious actors to launch powerful attacks, making this a threat to a wide range of organizations.
domainxlabslover[.]lolip_address_v4176.65.139.44ip_address_v4176.65.139.42ip_address_v4176.65.139.9destination_port5555Security teams and network administrators can hunt for the following patterns to identify compromised devices:
port5555network_traffic_patternxlabslover[.]lolprocess_name/bin/bash (with high network activity)network_traffic_pattern5555. Tools like Nmap, Shodan, or Censys can be used to identify exposed ADB interfaces. This aligns with D3FEND's D3-PSA - Port-scan Analysis.D3-NTA - Network Traffic Analysis to monitor for DNS requests to xlabslover[.]lol and outbound connections to the known C2 IPs. Look for anomalous traffic patterns, such as a smart TV suddenly sending large volumes of UDP packets.Preventing infection is key to defending against this type of botnet.
M1042 - Disable or Remove Feature or Program.M1035 - Limit Access to Resource Over Network.M1030 - Network Segmentation.M1051 - Update Software.Use firewalls to restrict access to the ADB port (TCP/5555) from the internet. Access should only be permitted from trusted management networks.
Mapped D3FEND Techniques:
Disable the Android Debug Bridge (ADB) feature on all devices where it is not essential for operation.
Mapped D3FEND Techniques:
Place IoT devices on a separate, isolated network segment with strict egress filtering to prevent them from reaching the internet and participating in DDoS attacks.
Keep device firmware up to date to ensure any vendor-supplied patches for ADB or other vulnerabilities are applied.
Mapped D3FEND Techniques:
The most effective countermeasure against the xlabs_v1 botnet is to harden the configuration of all IoT and Android devices by disabling the Android Debug Bridge (ADB) interface. This feature is intended for developers and should not be enabled on production devices connected to the internet. Network administrators should conduct thorough audits of all connected devices, including smart TVs, set-top boxes, and routers, to identify and disable any active ADB services. This can often be done through the device's settings menu, typically in a 'Developer Options' section. For enterprise environments, this process should be integrated into the device onboarding and configuration management lifecycle. By removing the attack surface entirely, organizations can prevent initial access by the botnet. This proactive hardening step is far more effective than reactive detection and response for this specific threat vector.
Implement strict inbound traffic filtering at the network perimeter to block all unsolicited connections to TCP port 5555. This serves as a critical compensating control for devices where ADB cannot be disabled. Perimeter firewalls should be configured with a default-deny rule for this port. For organizations with a large number of IoT devices, this rule should be applied to the specific network segments where these devices reside. This prevents the botnet's internet-wide scanners from discovering and connecting to vulnerable ADB interfaces within the network. While determined attackers may find ways around simple port blocking, it significantly raises the difficulty of exploitation and effectively mitigates the opportunistic, large-scale scanning method used by Mirai-based botnets like xlabs_v1. This technique directly hardens the network against the initial access vector.
Isolate all IoT devices onto a dedicated, segmented network with stringent access controls. This 'IoT VLAN' should have no direct access to the corporate network and heavily restricted access to the internet. Egress filtering rules should be applied to this segment, allowing only the specific connections necessary for the devices to function (e.g., to manufacturer update servers or specific cloud services). All other outbound traffic, especially the types of UDP floods used in DDoS attacks, should be blocked. This isolation strategy provides two key benefits against the xlabs_v1 threat: first, it makes it harder for a compromised device to communicate with its C2 server, and second, it prevents the device from being used as a weapon in a DDoS attack against external targets. This containment approach limits the impact of a potential compromise and protects the organization's reputation and network resources.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.