Jul 09, 2025 • GreyNoise Blog
GreyNoise Identifies New Scraper Botnet Concentrated in Taiwan
GreyNoise researchers have discovered a new, previously untracked variant of a scraper botnet primarily operating out of Taiwan. This malicious infrastructure...
Executive Summary
GreyNoise researchers have discovered a new, previously untracked variant of a scraper botnet primarily operating out of Taiwan. This malicious infrastructure is identifiable via a globally unique network fingerprint. To facilitate detection, analysts developed a specific signature utilizing JA4+, a suite of signatures designed to fingerprint network traffic patterns. While specific attribution remains unclear, the concentration of activity in Taiwan suggests a regional operational base. This botnet variant poses risks related to unauthorized data scraping and potential resource consumption for targeted organizations. The use of JA4+ signatures highlights a shift towards behavioral network analysis for identifying stealthy botnet communications that may evade traditional signature-based detection. Organizations should monitor network traffic for anomalous fingerprinting indicators and implement robust traffic analysis tools to mitigate the impact of such scraping operations. Continued monitoring is advised to track the evolution of this threat.
Summary
GreyNoise has identified a previously untracked variant of a scraper botnet, detectable through a globally unique network fingerprint. To detect it, GreyNoise analysts created a signature using JA4+, the suite of JA4 signatures used to fingerprint network traffic.
Published Analysis
GreyNoise researchers have discovered a new, previously untracked variant of a scraper botnet primarily operating out of Taiwan. This malicious infrastructure is identifiable via a globally unique network fingerprint. To facilitate detection, analysts developed a specific signature utilizing JA4+, a suite of signatures designed to fingerprint network traffic patterns. While specific attribution remains unclear, the concentration of activity in Taiwan suggests a regional operational base. This botnet variant poses risks related to unauthorized data scraping and potential resource consumption for targeted organizations. The use of JA4+ signatures highlights a shift towards behavioral network analysis for identifying stealthy botnet communications that may evade traditional signature-based detection. Organizations should monitor network traffic for anomalous fingerprinting indicators and implement robust traffic analysis tools to mitigate the impact of such scraping operations. Continued monitoring is advised to track the evolution of this threat. GreyNoise has identified a previously untracked variant of a scraper botnet, detectable through a globally unique network fingerprint. To detect it, GreyNoise analysts created a signature using JA4+, the suite of JA4 signatures used to fingerprint network traffic. GreyNoise has identified a previously untracked variant of a scraper botnet, detectable through a globally unique network fingerprint. To detect it, GreyNoise analysts created a signature using JA4+, the suite of JA4 signatures used to fingerprint network traffic.