Skip to content
New Report: Get your copy of The 2024 State of the Internet Report! | Download Today
Blogs

Pivoting for Nosviak

Summary

Censys has found evidence of a network of botnet management systems running a modified version of Nosviak, a little-known command-and-control service that has gained traction over the past few months. Many of this network’s systems share resources such as SSH keys, domains, and service branding, which alludes to a more extensive operation around selling denial-of-service attacks and proxy services to willing customers.

Introduction

Nosviak is a botnet command-and-control (C2) system that supports various callback communication protocols, including those used by Mirai and Qbot. Despite its capabilities, it has yet to be the subject of much research or scrutiny compared to other systems in this domain. However, over the past seven months, there has been an increase in hosts tagged as Nosviak in ThreatFox, a platform dedicated to sharing indicators of compromise (IOCs) associated with malware. Yet, still, we could not find anything more detailed than a label on a community-driven website.

 

ThreatFox entry for Nosviak

After developing a Nosviak fingerprint for Censys, we set out to uncover more information about this software. At the time, information on Nosviak was scarce, scattered across obscure corners of the internet. What we did find, however, was a fragmented trail of clandestine GitHub repositories, some littered with insults and cryptic taunts, while others surprisingly contained the complete Nosviak2 source code alongside custom branding and configuration files.

We then focused on the hosts already flagged in Censys running Nosviak2. Through various pivoting strategies, we began identifying patterns and characteristics that provided some insight into a specific ecosystem built around the Nosviak2 software. What started as a simple analysis of Nosviak soon unraveled into a broader discovery of a small network of interconnected hosts that managed a Nosviak-derived “DDoS-as-a-Service” operation.

“Stress-Testing” as a Service

Censys uncovered a botnet frontend operating under multiple aliases and storefronts, primarily offering DDoS and proxy services disguised as “stress testing” tools. These storefronts often share identical HTML templates, differentiated only by unique branding, names, and pricing structures. Our analysis reveals a strong reliance on the Nosviak C2 server, with many of these services using its branding API to apply distinct themes while potentially operating on shared infrastructure.

At the time of writing, the network consisted of over 150 hosts spanning twenty countries and autonomous systems, serving in the control, operation, and sale of these DDoS and proxy services. Some hosts may also function as operational relay boxes (ORBs). Despite operating under different names, many of these entities maintain direct or semi-direct connections.

Key examples of these storefronts include Moonrise c2, Rotate C2, Monolith C2, Runtz C2, and the Cindy Network. While these services flaunt distinct names, their websites follow a near-identical template – the only meaningful variations lie in the superficial elements like branding and wording.

The promotional language on these storefronts often includes slogans like “Feel the true power” or “Test your website security,” which consistently appear across all these websites. Below are some examples of this:

While we cannot definitively confirm that these servers are running Nosviak without direct access to the physical machines, several key indicators support this conclusion. In the following sections, we will reference the Nosviak2 source code, which we have mirrored here.

Banners and Branding

In the Nosviak2 source code (core/clients/produce.go), the default SSH server banner is initialized with the format string:

Many of the servers identified in this investigation followed this exact versioning scheme. In some instances, the Nosviak string was replaced with a more customized identifier, or the name was stripped out entirely, but the OpenSSH version (8.6p1) remained consistent across these cases.

We also note that the default configuration for Nosviak binds SSH to port 1337 as seen here in assets/config.json, and many of the services we identified were actively listening on this port as well.

Shared Nosviak SSH Key

One of the most incriminating pieces of evidence was an SSH private key (in PPK format) within the Nosviak source code. A key that seems to be used on several hosts found in this investigation.

 

assets/ $ head -n 4 ssh.ppk
-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn
NhAAAAAwEAAQAAAYEAzJ56X727XpePjcheS/x0TBwzFpcFuIIyhPzifeMN67yCTKS3KH/D

assets/ $ puttygen ssh.ppk -O private-openssh -o /dev/stdout | \
  ssh-keygen -y -f /dev/stdin | \
  awk '{print $2}' | base64 -d | \
  sha256sum | awk '{print $1}'

1d977c87558d8968e8a485a2f766594cd8de5f3e0e0f437eb23d091682a8823a

Below is a table of the hosts and ports where this SSH key was observed. While some hosts used the default Nosviak banner, others had modified it to include custom branding.

 

Provider Host SSH Banner
Cindy 82.117.87.174:9999 SSH-2.0-OpenSSH_8.6p1 CindyCNC@v1.0.0
Cindy 109.107.189.92:9999 SSH-2.0-OpenSSH_8.6p1 CindyCNC@v1.0.0
Cindy 138.124.55.197:1337 SSH-2.0-OpenSSH_8.6p1 CindyCNC@v1.0.0
MoonlyC2 93.123.85.167:999 SSH-2.0-OpenSSH_8.6p1 MoonlyC2@1.0
MoonlyC2 93.123.85.167:1337 SSH-2.0-OpenSSH_8.6p1 Nosviak2@v1.3.1
MoonlyC2 176.100.39.247:999 SSH-2.0-OpenSSH_8.6p1 MoonlyC2@1.0
MoonlyC2 83.168.69.44:999 SSH-2.0-OpenSSH_8.6p1 MoonlyC2@1.0
RCNC 172.236.12.66:8090 SSH-2.0-OpenSSH_8.6p1 RCNC@v1.3.1
Sentinel 45.128.157.72:8090 SSH-2.0-OpenSSH_8.6p1 Sentinel V2@v3.0.4
Sentinel 45.140.188.75:8090 SSH-2.0-OpenSSH_8.6p1 Sentinel V2@v3.0.4
Sentinel 45.90.13.41:8090 SSH-2.0-OpenSSH_8.6p1 Sentinel V2@v3.0.4
Sentinel 185.228.82.42:9999 SSH-2.0-OpenSSH_8.6p1 Sentinel V2@v3.0.3
Unknown 41.216.182.230:8090 SSH-2.0-OpenSSH_8.6p1 Nosviak2@v1.3.1

Despite operating under different names and aliases, many of these DDoS “services” share striking similarities. These include (other) shared SSH server keys, nearly identical web pages, and reused favicons.

These services heavily rely on Discord, Telegram, or both as their primary communication platforms. These channels act as central hubs for promoting their offerings, providing user support and updates, and showcasing “proofs” of their activities. Operators frequently share screenshots of successful attacks to demonstrate their capabilities and attract new customers.

 

MoonlyC2 Discord (discord[.]gg/moonlyc2) “proofs”  Cindy Network Telegram (t[.]me/cindynetwork) “proofs”. 

 

Some of these services even extend their marketing efforts to YouTube, where they maintain channels to advertise and showcase video demonstrations of their offerings. While most of these services focus on DDoS attacks, others, such as Moonrise C2, hint at broader capabilities such as proxies.

Pivoting from the Nosviak SSH Fingerprint

By pivoting from the default Nosviak SSH key, we can find links to other hosts that share some commonality with different hosts.  For example, while Sentinel Network, Moonly C2, RCNC, and Cindy Network use the default Nosviak SSH key, they also run web servers that include HTML elements found on several other hosts offering similar services. We can then use those elements as a jumping-off point to find other potentially related infrastructure.

 

Pivoting from Runtz C2

Runtz C2 (runtznetwork[.]icu) at IP address 45.90.13.179 was identified by pivoting from the shared HTML element described in the previous section, and in addition to the HTTP server, the SSH fingerprint on port 1337 (2af0…14cc) revealed 90 other hosts using the same key; below is a sample of hosts we found with this method that we could attribute:

 

Brand URLs Censys Host
Virus C2
  • virusc2[.]xyz 
  • t[.]me/VirusC2
109.237.99.83
Herios C2
  • herios[.]xyz
  • t.me/heriostcp
45.131.64.112
Dream C2
  • dreamproxy.xyz
  • t.me/dream_c2
37.114.63.131
Kaiten C2
  • kaitenc2.de
198.251.81.118
WaterNetworkk
  • t.me/waternetworkk
178.215.238.29
Tracer C2
  • t.me/tracerbotnet
93.123.85.191
SSN CNC
  • t.me/tcpysn
103.211.201.207

103.69.96.242

Elite Proxy
  • t.me/join_elite
  • t.me/+15KVi07LUoJjYjkx
185.17.0.31
Royal Reputations
  • royalprojets.mysellix.io
  • t.me/vouchroyal
  • t.me/royalsrc
62.182.84.156
Cardiac C2
  • cardiacapi.xyz
185.208.158.145

Many of these hosts led us to uncover even more infrastructure; for example, Elite Proxy’s web server at IP address 185.17.0.31 was identified using the same Runtz SSH key. This server hosted four distinct SSH services on ports 22, 1337, 8080, and 9090. The SSH service on port 9090 used a different SSH key shared with five additional hosts. Among these hosts, two were running Nosviak login panels.

 

67.211.216.8 (capital-consulting[.]ru) 178.215.238.160 (unknown domain)

 

Another host that was discovered using the Runtz SSH fingerprint was Dream C2 at 37.114.63.131 that operated a secondary SSH server on TCP port 9999 with a fingerprint (d281…69b6) shared with 18 additional hosts, a subset of which was branded as “Erf CNC”.

ErfCNC Login Panel

… And these Erf CNC hosts include a unique HTTP response body, which allowed us to pivot to other associated hosts. Among these, three specific hosts—37.114.50.59, 45.13.225.73, and 109.71.252.43 present an administrative login form that seems to be rebranded Nosvik.

 

45.86.155.56 37.114.50.59
37.114.63.131 83.168.110.181
83.168.107.127 45.11.229.109
37.114.37.227 194.15.36.89
45.13.225.73 109.71.252.43

 

Tracer C2 is linked to other services, such as 93.123.85.191 (WaterNetworkk / 2af0…14cc), which ran a status page on port 80 listing the types of attacks it supports.

But this Tracer C2 status page makes use of a rarely-used GitLab favicon found on only a small number of other hosts.

For instance, 103.211.201.207 (with an HTML title of “SSN Funnel Build” (possibly related to Nosviak’s “Funnel” feature)) and 167.114.4.98 (“SSN API Build”) both host HTTP servers on port 80 that appear to be API build status pages specific to the botnet.

The same GitLab favicon is also present on several standalone hosts: 160.30.21.74 features a status page on port 80 with the HTML title “Tajima C2/API”, while 212.193.31.66 identifies itself as the “CRIMINALITY API”.

 

160.30.21.74 212.193.31.66

This suggests that admins are automating the provisioning of new API servers using GitLab as a CI/CD, allowing them to iterate faster on new releases.

Along with the various domain names that we’ve already discussed, several others were found to be associated with this network:

nordnetface[.]sbs
rotate-c2[.]fr
noltranspstrer[.]cfd
noltranspstrer[.]top
akarui[.]fyi
tcppegasus[.]xyz
freeddos[.]fun
zopz-api[.]com
novac2[.]fun
homicide-api[.]lol 
primeapi[.]lol 
cybersecurity-solution[.]net 
hydroapi[.]xyz 
trainingdevsecops[.]com 
doner-api[.]ru 
kymev[.]com 
nekofish[.]cc 
overdose[.]sbs 
cindynetwork[.]xyz 
zytlink[.]top 
kailulu[.]fun 
aetherc2[.]com 
kodachi[.]xyz 
wintermc[.]fun 
filexland[.]fun 
hurtproxy[.]online 
cardiacapi[.]xyz 
sparkestops[.]cfd 
aetherapi[.]com 
sparkunsr[.]top 
moonlyc2[.]xyz 
stressermarket[.]xyz 
proxypro[.]io

At the time of writing, the majority of this infrastructure is hosted on OVH (AS16276) and Aeza (AS216246), all geographically spread across Germany, the Netherlands, the United States, Russia, and other regions where such operations can seemingly go unnoticed or without enforcement.

The reality is that many of these services appear deceptively innocent, often reflecting a network of individuals—possibly younger enthusiasts—applying their technical skills and interests in ways that could lead to harmful outcomes. While the primary target audience seems to be those aiming to disrupt game servers and chat servers, this does not rule out the potential for these networks to be abused for far more malicious purposes.

We have developed a single Censys search query consolidating all the indicators discussed in this post.  At the time of writing, the query identifies over 155 hosts.

Below is a table that breaks down each element in the search query into the specific thing it is looking for.

Description Fingerprint Censys
The SSH fingerprint for the default Nosviak server. 1d977c87558d8968e8a485a2f766594cd8de5f3e0e0f437eb23d091682a8823a Search
The SSH fingerprint that was found on Runtz C2 which is shared across over 90 other hosts. 2af0ec35b4f2039e850d50b4cb613ebb025512a1524226accddce9cb63d014cc Search
The SSH fingerprint for the Rotate C2 hosts. f38b96889a770641f3e64d831a1229b9d553bfe7747a677a567e2a299738955b Search
SSH fingerprint was found on a Dream C2 host shared with 19 other hosts.  d281264986ed864f0891bc1edc7c40d07a8695d36ac9e30d2f76e8a85aa569b6 Search
SSH fingerprint found on an Elite Proxy host that is shared with several other hosts. 2d361a7de23e20f38cf353395b3a35e468b170da984adfdff855a0a9b9896c70 Search
SSH fingerprints of unknown origin found running alongside an SSH server with the default Nosviak SSH server key.
c7cd4b5c81522a6bb519b7f6e60286a005fd5e1340656728803b9748f7dd6a0b
077fba6a621d64761b246c36fa5832cf6ec4400a12e78434c3243d3f48353a80
Search
The HTTP body hash of an SSN C2 build status page. sha1:e9371aca7b792814d55df07b56a9aafd25ee3b89 Search
Moonly C2 API Management server. sha1:c1a12dd0ac8283f60349f8800e5ac889d495b4cf Search
Status pages which may be used to determine what hosts are currently up or down within the network.
sha1:7894a2cf11597ca5b3dcd8516294d2b06528d3fa
sha1:8b1ebc6832852a06ab02097af10c4984b557a957
sha1:3e2561532be10aa91242c3867f3257f6a005b1b8
Search
Admin panels for Erf CNC sha1:63060ac2fb64f9045b054bbdd8d73d4f6905b4f3 Search
API management server for Erf CNC sha1:911936199d078877a5ccd93537471044251806ca Search
Shared HTML elements found on several advertised services such as Moonrise C2, Rotate C2, Monolith C2, Runtz C2, and the Cindy Network
assets/647538aa3b2ddd2dc925b188_logoorb.webp
<meta name=\”author\” content=\”Vuami.net\”>
Search
The rarely used GitLab favicon that was found on many “build status” pages found throughout this research. 06d4abc973616ca572b82ac4c7a2078b Search
Various HTML titles that were discovered.
Login – Nosviak4
SSN Funnel Build
SSN API Build
Herios – Feel The True Charms of DDoS
CRIMINALITY API
Cardiac API Online
Search
The hash of a certificate that was found running on “Nosviak4” dashboards. dc51f51e8094f7a19089a1b8776fdbddb89a6bbd612858c490ed0a7239958a5d Search
Various modified SSH banners which have been seen with Nosviak installed that indicate that specific networks owner.
CindyCNC
MoonlyC2
Sentinel V2
RCNC
Nosviak2
SSN CNC
Search

About the Author

The Censys Research Team
Attack Surface Management Solutions
Learn more