{"id":34835,"date":"2020-05-07T06:14:23","date_gmt":"2020-05-07T06:14:23","guid":{"rendered":"http:\/\/58d92679-3e73-4542-af83-edb27dffdc5d"},"modified":"2020-05-07T06:14:23","modified_gmt":"2020-05-07T06:14:23","slug":"for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/","title":{"rendered":"For 8 years, a hacker operated a massive IoT botnet just to download Anime videos"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/07\/30c7d021-1e78-43b8-be0e-e0fd4b8a7861\/anime.jpg\" class alt=\"anime.jpg\"><\/span><span class=\"credit\">Image: Screenshot from Golden Kamuy anime series by Geno Studio.<\/span> <\/p>\n<p>For almost eight years, a hacker has silently hijacked D-Link NVRs (network video recorders) and NAS (network-attached storage) devices into a botnet that had the sole purpose of connecting to online websites and download anime videos.<\/p>\n<p>Named Cereals and first spotted in 2012, the botnet reached its peak in 2015 when it amassed more than 10,000 bots.<\/p>\n<p>However, despite its size, the botnet operated without detection from most cyber-security firms. Currently, Cereals is slowly disappearing, as the vulnerable D-Link devices on which it fed all these years have started aging and are being decommissioned by their owners. Further, the botnet&#8217;s decline was also accelerated when a ransomware strain named <a href=\"https:\/\/www.dlink.com\/en\/security-bulletin\/nas-ransomware\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Cr1ptT0r<\/a> wiped the Cereals malware from many D-Link systems in the winter of 2019.<\/p>\n<p>Now that both the botnet and the vulnerable devices behind it are dying out, cyber-security firm Forcepoint published a <a href=\"https:\/\/www.forcepoint.com\/blog\/x-labs\/botnets-nas-nvr-devices\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">report on the botnet&#8217;s past operations<\/a>, without fear that its report could draw attention to vulnerable D-Link systems and spark a new series of attacks from other botnets.<\/p>\n<h3>Botnet exploited just one single vulnerability<\/h3>\n<p>According to Forcepoint researchers, the Cereals botnet was unique in its modus operandi because it exploited just one vulnerability during all its eight-year life.<\/p>\n<p><a href=\"http:\/\/roberto.greyhats.it\/advisories\/20120208-dlink-rce.txt\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">The vulnerability<\/a> resided in the SMS notification feature of the D-Link firmware that powered the company&#8217;s line of NAS and NVR devices.<\/p>\n<p>The bug allowed the Cereals author to send a malformed HTTP request to a vulnerable device&#8217;s built-in server and execute commands with root privileges.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Forcepoint says the hacker scanned the internet for D-Link systems vulnerable to this bug, and the exploited the security flaw to install the Cereals malware on vulnerable NAS and NVR devices.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/\" class=\"lazy\" alt=\"cereals.png\" data-original=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/07\/f6488f6b-63f6-4e44-af92-5ce011b21fdb\/cereals.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/07\/f6488f6b-63f6-4e44-af92-5ce011b21fdb\/cereals.png\" class alt=\"cereals.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Forcepoint<\/span><\/p>\n<p>But despite exploiting just one vulnerability, the botnet was quite advanced. Cereals maintained as many as four backdoor mechanisms to access infected devices, it attempted to patch systems to prevent other attackers from hijacking systems, and it managed infected bots across twelve smaller subnets.<\/p>\n<h3>A hobby project?<\/h3>\n<p>However, despite this advanced setup, Forcepoint says that the botnet was most likely a hobby project.<\/p>\n<p>First, the botnet exploited just one single vulnerability during the botnet&#8217;s eight-year life, without ever bothering to expand its operation to other systems beyond D-Link NAS and NVRs.<\/p>\n<p>Second, the botnet never strayed from its Anime video leeching purpose. Forcepoint said the botnet did not execute DDoS attacks, nor did it find evidence that the botnet tried to access user data stored on the NAS and NVR devices.<\/p>\n<p>All of this suggests that the botnet&#8217;s author, believed to be a German man named Stefan, never had any criminal intentions in building Cereals, a botnet that appears to have had just one single purpose &#8212; downloading Anime vids.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The botnet consisted solely of D-Link NAS and NVR devices and the botnet peaked at 10,000 bots in 2015.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34836,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-34835","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>For 8 years, a hacker operated a massive IoT botnet just to download Anime videos 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"For 8 years, a hacker operated a massive IoT botnet just to download Anime videos 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-07T06:14:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"504\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"For 8 years, a hacker operated a massive IoT botnet just to download Anime videos\",\"datePublished\":\"2020-05-07T06:14:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/\"},\"wordCount\":480,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/\",\"name\":\"For 8 years, a hacker operated a massive IoT botnet just to download Anime videos 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos.jpg\",\"datePublished\":\"2020-05-07T06:14:23+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos.jpg\",\"width\":1000,\"height\":504},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"For 8 years, a hacker operated a massive IoT botnet just to download Anime videos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"For 8 years, a hacker operated a massive IoT botnet just to download Anime videos 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/","og_locale":"en_US","og_type":"article","og_title":"For 8 years, a hacker operated a massive IoT botnet just to download Anime videos 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-07T06:14:23+00:00","og_image":[{"width":1000,"height":504,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"For 8 years, a hacker operated a massive IoT botnet just to download Anime videos","datePublished":"2020-05-07T06:14:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/"},"wordCount":480,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/","url":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/","name":"For 8 years, a hacker operated a massive IoT botnet just to download Anime videos 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos.jpg","datePublished":"2020-05-07T06:14:23+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos.jpg","width":1000,"height":504},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/for-8-years-a-hacker-operated-a-massive-iot-botnet-just-to-download-anime-videos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"For 8 years, a hacker operated a massive IoT botnet just to download Anime videos"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34835"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34835\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34836"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}