Long list of IP addresses attacking a phpBB forum in May 2025

This post was written by eli on May 12, 2025
Posted Under: Server admin

A good-old phpBB forum that I run had a massive surge of traffic somewhere in May 2025. This had already started a couple of months earlier, but in May it knocked down the web server due to the number of apache instances. Plus the logs reached ~ 3 GB.

This doesn’t seem to be a DDoS attack, mainly because the access from each IP address was far more scarce than a legit bot: There would be several minutes, if not hours between each request. With the huge amount of bots involved, it would be easy to completely knock out the website with a moderate access pattern from each IP address. Besides, there’s no reason to attack the specific forum. It more looks like a very brute-force attempt to hack the forum itself for the purpose of spamming or something.

One could turn to Cloudflare in situations like this, but I tried the DIY approach. Namely, to block the IP addresses of the bots by virtue of the firewall, as I discuss in a separate post of mine. The strategy with these bots was somewhat different: As the phpBB related bots occasioanally did something that no regular user would do (what exactly I’ll keep to myself) it was enough to detect this event and blacklist the IP address right away.

Which I did. After a couple of day, the list landed on ~78,000 IP addresses. Note that this is larger than ipset’s default number of allowed elements, which is 65536. So when creating the ipset, be sure to use maxelem with a larger number (I used 524288 when I didn’t know how bad the situation was).

I checked a few of these addresses, and they appear to origin from Asia (Vietnam, Indonesia etc.).

The nice thing is that 24-48 hours after I enabled the related blacklisting mechanism, the attack virtually stopped. The firewall recorded no more than ~30 dropped packets per minute on the ipset-matching rule. True victory.

The list of IPs can be downloaded here, in case it helps someone understand what’s going on. If you do have an idea, please comment below.

It’s a plain zip of a list of IP addresses, one address per row. It’s possible that a few IP unrelated addresses appear on this list, which could be other kinds of bots that were blacklisted on the same server. Maybe a dozen of these.

Ehm, no

The silence was short-lived. A couple of days later, the bots came again, this time in a much larger scale. Within a few days, I collected ten times as many IP addresses, that is ~840,000 of them. That’s a really large number. This larger list of IPs can be downloaded here. It was obtained exactly the same as the previous one.

But after this swarm, it got silent again. For a while. In the days that followed, the same traffic pattern came back, IPs were blacklisted (~250k of them at some point) and so it went on. But with the blacklisting mechanism, the load on the server was quite small, so for now I consider the problem solved. Let’s hope it stays this way.

Reader Comments

Blocking IPs in firewall is likely to cause colleteral damage and is laborious unless you automate it in which case it will cause even more collateral damage. As the deny list grows, it will also start slowing the system. My forum is getting currently over 9000 requests per minute and I found a way to disconnect them all before they reach phpBB and overload database server.

#1 
Written By Santeri on June 9th, 2025 @ 07:35

Most likely a variant of this bot net

https://asec.ahnlab.com/en/89083/

About screenshots and UIs:

The screenshots of SVF in the ASEC article depict the Discord-based C2 interface, typical of recent Discord-abusing malware but dissimilar to the classic minimalist CLI/IRC UIs in Mirai and Gafgyt. Graphical or web dashboard control is uncommon in classic botnet code but growing in “commodity” botnet marketing.

Distinctive aspects:

SVF is not a direct clone of any particular existing botnet, but combines traits found in:

Mirai (infection method, DDoS focus)

Mozi and XorDDoS (modular Python, Linux/SSH targeting)

Newer Discord-controlled malware (communication channel and group management)

No attribution to a famous family:

While SVF reuses common attack chains and open-source libraries (like discord.py), it is not explicitly identified as a variant or renamed version of Mirai, Gafgyt, or Mozi in current threat intelligence. The Discord C2 and proxy automation are relatively novel combinations for Linux DDoS botnets as of mid-2025

.

Conclusion:

SVF botnet’s architecture and screenshots are most similar to new-generation, modular Linux DDoS botnets (e.g., Mozi, Python-based IRC/Discord bots) but are unique in integrating Discord C2 and proxy-scraping in a Linux brute-force SSH campaign. It does not entirely clone any single previous botnet but instead blends several established techniques into a new package

#2 
Written By Web Admin 1 on August 3rd, 2025 @ 19:51

Add a Comment

required, use real name
required, will not be published
optional, your blog address