Unlock Exclusive Cybersecurity Learning Resources — Free & Limited-Time Offer!

ENROLL NOW

Enroll for CEH & Sec+ Hands-on Training Combo - get up to 30% Discount

TL;DR: Gayfemboy is a resurfaced, Mirai-family botnet (first seen in 2024) that re-emerged in mid-2025 with expanded exploitation of router and network gear vulnerabilities, multi-architecture payloads, stealthy anti-analysis tricks, and dual motives (DDoS botnet + opportunistic cryptomining). The campaign has impacted organisations across multiple industries and countries and uses flamboyantly named C2 domains and artefacts that make it easy to talk about — but hard to remove.

1) Executive summary

FortiGuard Labs and other intel teams observed a July–August 2025 resurgence of Gayfemboy. The operators exploit a range of known vendor flaws (DrayTek, TP-Link, Raisecom, Cisco and others) to drop downloader scripts that fetch architecture-specific payloads and XMRig miners, then enrol devices into DDoS and backdoor fleets. The malware compiles for ARM, MIPS, PowerPC and x86 families, uses sandbox evasions and file-renaming tricks, and maintains C2 reachability via public resolvers and rapidly rotating domains. Targeting has included manufacturing, telco/tech, construction and media across Brazil, Germany, France, Israel, Mexico, Switzerland, the U.S., and Vietnam.

2) Anatomy of the malware (technical breakdown)

Multi-stage infection

  1. Initial access: attackers exploit internet-exposed devices,s CVE,s or use weak credentials to run small downloader scripts on devices. These scripts are often named after vendor/product strings (e.g., asus, realtek, vivo) and request architecture-specific binaries.
  2. Payload fetch & unpack: downloader retrieves an obfuscated Gayfemboy binary (or an XMRig miner). Gayfemboy uses unusual file-naming for each architecture (breaking Mirai’s predictable patterns), making simple YARA rules less effective.
  3. Persistence & lateral steps: the binary installs persistence hooks, may rename system tools (e.g., ps, top, curl, wget) to hide itself, and spawns watchdogs to kill competing malware. Analysts observed wrappers replacing binaries, so standard admin checks miss the miner/process.

Capabilities

3) TTPs (Tactics, Techniques & Procedures)

4) Observed impact and victims

Actors have hit a mix of small and medium enterprise perimeter devices and some larger organisations where edge devices were unpatched. Impact modes include:

5) IOCs (selection for detection/blocklists)

Note: infrastructure changes fast. Treat domain/IP lists as immediate but short-lived indicators and combine with behavioral detections.

Domains (examples observed in intel reporting): i-kiss-boys[.]com, furry-femboys[.]top, twinkfinder[.]nl, cross-compiling[.]org, 3gipcam[.]com.

IPs / observed sources (examples from active scans): 87.121.84.34, 220.158.234.135.

Behavioural indicators:

6) Vulnerabilities & CVEs (what to patch first)

FortiGuard and other vendors list multiple exploited product flaws across DrayTek, TP-Link, Raisecom, Cisco and more. Vendor and vendor-specific CVEs change as researchers find new issues; as an immediate step, apply available vendor firmware updates and consult Fortinet/Broadcom advisories for a precise CVE list and IPS signatures.

(If you want, I can extract the exact CVE numbers from Fortinet’s advisory and format a prioritised patch matrix for your device inventory.)

7) Practical detections & SIEM rules (quick starters)

Here are high-value rules you can drop into your logging stack immediately:

  1. DNS anomaly rule: Alert when IoT/edge device queries public DNS resolvers (1.1.1.1/8.8.8.8/8.8.4.4) AND the source is a device normally pinned to corporate DNS.
  2. Process string match: Scan memory/disk for twinks :3 or meowmeow. Flag occurrences from non-workstation hosts.
  3. Binary rename spotting: Detect /bin/ps.original, /bin/top.original, or unexpected wrappers for curl/wget.
  4. Network scanning behaviour: Identify spikes in outbound scanning to multiple remote IPs/ports originating from edge devices.
  5. Unexpected persistence: New crontab entries or startup scripts in routers/embedded devices that call unknown vendor-named binaries.

I can convert these into Sigma rules or Snort/Suricata signatures if you want ready-to-deploy files.

8) Recommended containment & remediation playbook

  1. Immediate isolation: If a router/gateway shows suspicious DNS/scan/miner behaviour, logically isolate it (VLAN or ACL) while preserving forensic data.
  2. Collect volatile evidence: Capture running process list, network connections and memory dump where possible (note: many IoT devices make memory capture hard).
  3. Factory-reset & firmware reinstall: Reflash vendor firmware from a trusted source (not backup configs that may contain the compromise). Replace if hardware EOL.
  4. Rotate credentials & management access: Replace device credentials, ensure management interfaces are VPN-only, and disable remote web admin.
  5. Block & monitor: Blacklist known C2 domains, block malicious IPs at the perimeter while monitoring for fallback infrastructure.
  6. Upstream DDoS mitigation: Coordinate with ISP/hosting provider for rate limiting or scrubbing if an active DDoS occurs.
  7. Post-incident hardening: Harden device inventory—replace old devices, enforce central management, and restrict internet exposure for management planes.

9) Attribution & operator profile (what we can infer)

10) Why Gayfemboy matters — strategic outlook

Gayfemboy is a reminder that:

Appendix A — Key public advisories & analysis (read next)

Leave a Reply

Your email address will not be published. Required fields are marked *

GET A FREE CONSULTATION

CISM Training by Wiseman Cybersec
wisemancybersec.com
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.