BIMP-BotNet
It all started back in December 2021, when i discovered password
attacks on mail systems. What I saw was 1 login attempt from 1 IP
but with 3-5 diffrent ip's within 1-2 minutes in between. So this
was / still is "low and slow" password attacks. And they continue to
this day aginst anything with a open servise with a login promt
exposed to the Internet, but with a "big love" for anything mail
related.
We know for a fact that many danish companyes have allready been
"hacked" by this network.

The
name
BIMP-BotNet, which is an abbreviation for Bruteforce, IOT, Malware,
Phishing botnet.
The hunt.
I have been writing a lot about the BIMP-BotNet over the years. I can recommend
publications from
SektorCERT
What is new
I belive that BIMP-BotNet is just a part of a large proxy network
created by OT/IOT devices, that has been hacked. Often with an
indication that a
SSH keys
overwrite,
that give full access for a device quite easy. And quite often we
see BusyBox
systems with the
Dropbear SSH server implementation being part of the proxy
network.
A lot of different kinds of system seams to have been infected by
this botnet. So it is not just the GR241AG i see.
The list is long..
BIMP-BotNet is just using that big botnet to do the attacking. We
have monitored a hacked IOT network device "GR241AG
Gateway Router" for some time now, and the infected device gave
us 130GB of traffic pr week to look at. That is a lot of traffic...
And a lot of the traffic is proxy ssh traffic from Vietnam, US and
so on..
Picture below - GR241AG Gateway Router -
Manual

From this giant proxy network we see a lot of attacking on many
systems. We eaven foud infected devises from some "NATO special
forces military units"
being part of this networkk. We see C2 backend russian
infrastructure IP's for unknown malware. And funny enough will the
identifyed C2 IP's in the proxy network not show up as listed for
any known bad stuff.
So the
BIMP-BotNet is what we belive part of a giant APT proxy network
running globally. We can say that 7.200+ IP's from the proxy network
is running the BIMP-BotNet. So how big this proxy network actually
is is hard to say. But at first when i discovered the BotNet i found
more the 12.000+ infected IP's. But right now i can say that i see
arround 100+ new IP'a i haven't seen before.
And it is all based on OT/IOT devises on the internet and someone
is running this netwok....
Shift in attacks (1 Marts 2026)
On Marts 1 2026 I have seen a shift in how the TLS traffic is
handled by the BIMP-BotNet, that is when they do bruteforce network
attacks. This meant that about half were not blocked by SNORT DROP
IDS Rules. I have then created new SNORT IDS Drop and alerts rules
to capture that shift.
News from the ProxyWorld (Marts 15 2026)
Law enforcement has
taken down a large BotNet with 369.000 infected hosts with the
AVRecon malware and is called SocksEscort. That is a good win
for Law Enforcement
EUROPOL. The person behind this Proxynetwork is
Adrian Crismaru from Moldova with alias Deem3n®. They
attacked more the 1.200 different kinds of hardware to create there
proxy network.
As mentioned before. I have never seen any changes since December
2021 in BIMP. That change came marts 1 2026 in the way they carry
out there attacks on SMTP / SMTP with bruteforce attacks. And the
news about the takedown came out 12 Marts.
I think however it is safe to say that the BotNet i have seen in
many years, and called BIMP-BotNet is AVRecon...
However it may seem to take some time to bring all this down...
Attacks is still on gouing and there a lot of infected hosts in 163
countries.

Prevention
-
Do NOT leave any system with a BusyBox/Dropbear exposed to
the internet
- Use 2FA on everything
- Do not expose logins pages of any kind to the Internet at all, if you don't
need it.
- Use GEO protection for exposed servises
- Use "point to point" Firewall rules
- Use inline IDS (IPS systems) to drop attack traffic. Don't use it
as IDS but IPS
- Only allow SSH traffic on your network to trusted sources
/ destinations. DO NOT LEAVE IT OPEN TO ANY.
- Allways patch
- Remove EOL (End-of-life) devices from your network. (Cleanup
firewall rules, NAT Rules, to those devices)
IOC
With the IOC's here you will locate the BIMP-BotNet that is
part of the Proxy network. And this is a god way to start look at
the network it self
if you want to dig deeper into this proxy network.
DOMAINS - IP'S
Blacklotuslabs
avrecon
Known Domains list
List
JA3
f17ca639ecdcaa65b4521c49e3515ef9
JA4
t12i860600_e18388e7f3a3_4446390ac224
IP-Block list with more then 7.284+ IP addresses for
BIMP-BotNet attacks
Download
Suricata IDS Drop Rule
Download my IDS Rule set for Suricata
SNORT IDS Drop Rule
Download my IDS Rules for SNORT. New IDS detection have
been released (16-03-2026).
Happy Hunting...
IP Blocklist
Latest Update
15-03-2026
Download