Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Unveiling GoBruteforcer: The role of AI-driven server defaults, vulnerable passwords, and crypto-centric strategies in modern attacks

Jan 30, 2026 | Threat Intelligence Research

GoBruteforcer Botnet Targets Exposed Linux Servers with Weak Credentials

GoBruteforcer, a modular botnet identified by Check Point Research, is exploiting poorly secured Linux servers, targeting services like FTP, MySQL, and phpMyAdmin through brute-forcing credentials. Estimations suggest that over 50,000 servers are vulnerable to these attacks.

The GoBruteforcer operates by deploying a combination of malicious modules, including an IRC bot and bruteforcer, to automate credential testing against exposed services. The botnet exploits the widespread issue of weak or reused passwords, leveraging AI-generated deployment examples that favor common usernames and default settings, alongside outdated technologies like XAMPP, which frequently ship with weak configurations. The bot fetches common operational usernames from a centralized command and control (C2) server, where attackers manage the bot’s activities.

Recent reports confirm the botnet’s interest in crypto-related databases, indicating a financially motivated angle to its operations. Infected systems often lead to the acquisition of sensitive data, backdoor access, and the potential expansion of the botnet through further compromises. The prevalence of such vulnerabilities amplifies the attractiveness of mass exploitation techniques, enabling attackers to effectively capitalize on weak configurations.

Why this matters: The GoBruteforcer botnet exemplifies the risks posed by exposed services running with insufficient security measures. Vulnerable servers can be quickly compromised, resulting in data loss, unauthorized access, and the potential for extensive network breaches. Defenders need to focus on securing their internet-facing services, implementing rigorous credential management, and continuously monitoring for vulnerabilities in their infrastructure.

Organizations can mitigate the risks associated with GoBruteforcer attacks by leveraging threat intelligence, enhancing vulnerability scanning processes, and implementing effective firewalls to restrict unauthorized access to sensitive services.

IOCs Overview:

  • C2 IP Addresses:
    • 190.14.37.10
    • 93.113.25.114
    • xyz.yuzgebhmwu.ru
  • Malware Hashes:
    • IRC Bot (x86): 0x86cf85a2…
    • Bruteforcer (x86): 0x64e02ff8…

This information underlines the urgency for continuous vigilance and proactive measures in cybersecurity within organizations.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles