GreyNoise Identifies New Scraper Botnet Concentrated in Taiwan
GreyNoise has identified a previously untracked variant of a scraper botnet, detectable through a globally unique network fingerprint. While the botnet uses a simple and easily spoofed user-agent string — Hello-World/1.0 — its real signature lies in the behavior of the devices sending the traffic.
To detect it, GreyNoise analysts created a signature using JA4+, the suite of JA4 signatures used to fingerprint network traffic. This approach allows analysts to detect traffic based not on what it claims to be, but how it behaves — making it difficult to evade or spoof.
The signature includes:
- JA4H (HTTP fingerprint): Captures how HTTP headers are ordered and formatted.
- JA4T (TCP fingerprint): Encodes how a device establishes network connections.
These behavioral fingerprints form a meta-signature that is globally unique to this botnet variant.
To read the complete article see: GreyNoise Blog\n
This post is licensed under CC BY 4.0 by the author.