{
	"id": "d8b8ee21-8a72-45dd-a9e2-ff8b6210e0d6",
	"created_at": "2026-04-06T00:06:41.465219Z",
	"updated_at": "2026-04-10T03:20:27.25426Z",
	"deleted_at": null,
	"sha1_hash": "ce1cb555d19173f082a65f5979fcbfc8b5cfc760",
	"title": "Botnet C\u0026C | Botnet Threat Update July to December 2025 | Report",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 433734,
	"plain_text": "Botnet C\u0026C | Botnet Threat Update July to December 2025 |\r\nReport\r\nArchived: 2026-04-05 19:20:28 UTC\r\nreport\r\nBotnet Command \u0026 Controller (C\u0026C) activity increased 24% this period, with Remote Access Trojans (RATs)\r\naccounting for 42% of the Top 20 malware associated with botnets. Learn which Russia-based registrar saw a\r\n+9,608% surge in botnet C\u0026C domains—and which major cloud providers are taking action. Read the full report. \r\nHelp and recommended content\r\nSee below for helpful articles and recommended content\r\nSource: https://www.spamhaus.org/resource-hub/botnet-c-c/botnet-threat-update-july-to-december-2025/\r\nhttps://www.spamhaus.org/resource-hub/botnet-c-c/botnet-threat-update-july-to-december-2025/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.spamhaus.org/resource-hub/botnet-c-c/botnet-threat-update-july-to-december-2025/"
	],
	"report_names": [
		"botnet-threat-update-july-to-december-2025"
	],
	"threat_actors": [],
	"ts_created_at": 1775434001,
	"ts_updated_at": 1775791227,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ce1cb555d19173f082a65f5979fcbfc8b5cfc760.pdf",
		"text": "https://archive.orkl.eu/ce1cb555d19173f082a65f5979fcbfc8b5cfc760.txt",
		"img": "https://archive.orkl.eu/ce1cb555d19173f082a65f5979fcbfc8b5cfc760.jpg"
	}
}