xlabs_v1 botnet hijacks exposed Android devices to attack Minecraft servers


A new Mirai-based botnet called xlabs_v1 is hijacking Android and IoT devices that expose Android Debug Bridge on the internet, then using them in paid DDoS attacks against game servers.

Hunt.io researchers uncovered the operation after finding an exposed server in the Netherlands that contained the botnet operator’s toolkit. The files showed how xlabs_v1 infects ADB-exposed devices, connects them to command infrastructure, and measures their bandwidth for DDoS-for-hire pricing.

Minecraft servers appear to be a major target. The botnet includes a RakNet flood attack, a protocol family commonly tied to game traffic, and its distribution server exposed a bot binary on TCP port 25565, the default Minecraft server port.

What xlabs_v1 does

xlabs_v1 targets devices with ADB exposed on TCP port 5555. ADB is a legitimate Android development and debugging tool, but it should not be reachable from the public internet.

When attackers find an exposed device, they can push a payload through ADB and execute it without needing the owner to click a file. Hunt.io said the toolkit included multi-architecture binaries for ARM, MIPS, x86-64, ARC, and Android APK targets.

That broad build set allows the botnet to target many device types, including Android TV boxes, smart TVs, set-top boxes, routers, and low-cost IoT hardware that ships with debugging features left open or poorly secured.

At a glance

ItemDetails
Botnet namexlabs_v1
Malware familyMirai-derived IoT botnet
Main infection vectorExposed Android Debug Bridge on TCP port 5555
Main targetMinecraft and other game servers
Business modelDDoS-for-hire
Operator handleTadashi
ResearcherHunt.io
Infrastructure locationOffshore LC netblock in the Netherlands

How researchers found the botnet

Hunt.io identified the operation in early April 2026 while monitoring bulletproof hosting networks. Its AttackCapture tool found an open directory on a Netherlands-hosted server at 176.65.139[.]44.

The directory had no authentication and exposed the operator’s working files. The captured set included two ELF binaries, infection payloads, proxy credentials, and a placeholder target file.

Researchers compared a stripped production ARM32 binary with an unstripped development build. That mistake exposed important internal details, including the botnet brand, command-and-control domain, operator handle, and authentication token.

Why Minecraft servers are in the crosshairs

Game servers are frequent DDoS targets because downtime is immediately visible. A short outage can disrupt players, damage a server’s reputation, and push small operators to pay for attacks or protection.

Screenshot

xlabs_v1 includes 21 flood variants across TCP, UDP, and raw protocols. Hunt.io specifically highlighted RakNet and OpenVPN-shaped UDP floods as part of the attack set.

The RakNet capability and the use of TCP port 25565 for bot distribution strongly point to game-server disruption as the botnet’s main commercial purpose.

How the infection works

After landing on a device, the bot drops into the /data/local/tmp/ directory and starts running in the background. That location is commonly writable on Android systems and often abused by malware using ADB access.

The bot then hides signs of its launch by capturing an infection-vector argument and clearing it from process listings. It also overwrites its process name with /bin/bash to look less suspicious during a quick check.

After that, it detaches from the terminal, closes standard input and output handles, and continues as a background process. This does not make it invisible to security tools, but it can hide the infection from casual inspection.

Key technical behavior

BehaviorPurpose
ADB abuse on TCP 5555Initial access to exposed Android and IoT devices
Payload drop in /data/local/tmp/Runs malware from a writable Android directory
Process name changed to /bin/bashHelps the bot blend into process listings
ChaCha20-protected string tableHides internal strings such as C2 details and tokens
8,192 Speedtest socketsMeasures upstream bandwidth for pricing infected devices
21 flood variantsSupports different DDoS attack methods

The botnet acts like a commercial service

xlabs_v1 does more than infect devices and wait for commands. It profiles each infected device’s network capacity by opening 8,192 parallel sockets to a nearby Speedtest server.

Hunt.io said this bandwidth profiling helps the operator place bots into pricing tiers. A fast home fiber device can be worth more to a DDoS-for-hire customer than a slow connection.

Process masquerade and daemonization sequence in the bot’s main routine (Source – Hunt.io)

This shows that the operator is managing the botnet like a rentable attack platform. The malware’s goal is not persistence for espionage. It is reliable traffic generation for customers who want to knock services offline.

Infrastructure and command channel

The operation was hosted inside a single bulletproof /24 netblock announced by Offshore LC in the Netherlands. Hunt.io said the same netblock contained command, staging, distribution, and co-located Monero cryptojacking infrastructure.

The bot connects to xlabslover[.]lol over TCP port 35342 and sends a registration message with host details, CPU count, RAM size, and an authentication token.

If the outbound connection fails, the malware can open a fallback listener on TCP port 26721 and try several iptables paths to keep a re-entry channel available.

What defenders should monitor

  • Internet-facing Android devices with TCP port 5555 exposed.
  • Unexpected files in /data/local/tmp/, especially arm7.
  • /bin/bash processes running without a normal controlling terminal.
  • Outbound connections to xlabslover[.]lol.
  • Outbound traffic to TCP port 35342.
  • Unexpected listeners on TCP port 26721.
  • Large bursts of Speedtest-related connections from Android or IoT devices.
  • Traffic to pool[.]hashvault[.]pro from devices that should not mine cryptocurrency.

Why exposed ADB is a serious problem

ADB gives developers powerful control over Android devices. When it is exposed to the internet, attackers can turn that same control into remote malware installation.

Many infected devices may not look like traditional computers. Android TV boxes, smart TVs, routers, and cheap IoT systems often run quietly for months without close security monitoring.

That makes them useful to DDoS operators. Owners may not notice the infection until their internet connection slows down, their device becomes unstable, or their network appears in abuse reports.

  • Disable ADB on all Android and IoT devices unless it is actively needed.
  • Never expose ADB on TCP port 5555 to the public internet.
  • Block inbound access to TCP 5555 at routers, firewalls, and cloud security groups.
  • Restart and factory reset devices that show signs of compromise.
  • Update firmware on Android TV boxes, routers, and smart devices where updates are available.
  • Restrict outbound traffic from IoT networks to only required destinations.
  • Segment smart TVs, set-top boxes, and IoT devices away from business systems.
  • Monitor for abnormal upload spikes and repeated outbound connection bursts.

Impact for Minecraft server operators

Minecraft server owners should treat xlabs_v1 as another sign that game infrastructure remains a profitable DDoS target. The botnet’s design shows direct interest in game-server flooding rather than general disruption alone.

Small server operators may face the greatest pressure because they often rely on basic hosting plans or consumer-grade DDoS protection. Attackers can rent traffic from botnets like this to overwhelm those setups.

Server owners should use reputable DDoS-protected hosting, keep firewall rules tight, monitor traffic baselines, and prepare failover or filtering plans before attacks begin.

What this means for defenders

xlabs_v1 is not the most advanced botnet, but it is organized enough to create real disruption. Its operator built pricing logic, multi-architecture payloads, many flood types, and competition-killing behavior into the malware.

The exposed staging server also shows how quickly a single operational mistake can reveal a cybercriminal service. Hunt.io used one leaked development build to reconstruct the botnet’s targets, infrastructure, command flow, and operator identity markers.

For defenders, the priority is simple. Remove exposed ADB, monitor IoT traffic, isolate smart devices, and treat unusual outbound bandwidth from Android hardware as a possible sign of botnet abuse.

FAQ

What is xlabs_v1?

xlabs_v1 is a Mirai-derived IoT botnet used for DDoS-for-hire attacks, with a strong focus on Minecraft and other game servers.

How does xlabs_v1 infect devices?

It targets Android and IoT devices with Android Debug Bridge exposed on TCP port 5555, then pushes and runs malware through that access.

Which devices are at risk?

Android TV boxes, smart TVs, set-top boxes, routers, and IoT devices are at risk if ADB is enabled and exposed to the internet.

Why does xlabs_v1 target Minecraft servers?

The botnet includes game-focused flood capabilities, including a RakNet flood variant, and its infrastructure uses the default Minecraft server port for distribution.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages