Massive 90,000-strong sex botnet spammed your Twitter for months

Researchers call it one of the largest malicious campaigns ever recorded.

In ancient Greece, sirens were mythological creatures whose singing lured sailors to their doom, as Odysseus' mates discovered.

Fast-forward to 2017, and "SIREN" is nothing less than a ginormous, 90,000-account strong porn botnet that spammed social media users for months with 8,500,000 tweets.

Security researchers at ZeroFOX, who tracked the malicious, since-deleted accounts since February, called the botnet "one of the largest malicious campaigns ever recorded on a social network."

Just like their half-bird, half-women counterparts, the bots seduced online sailors with links advertising pornographic content. And they were incredibly successful in doing so.

As the botnet used trackable, Google-shortened URLs, it was possible to ascertain that SIREN netted more than 30,000,000 clicks from its victims.

Original image replaced with Mashable logo
Original image has been replaced. Credit: Mashable

All the accounts used a very similar formula.

They all had a photo of an attractive woman as a profile pic and they all posted sexually suggestive albeit cripplingly ridiculous tweets.

"The tweets themselves generally contained canned, sexually-explicit text, often in broken English, compelling the target to click, such as 'you want to meet with me?' or 'Push,don’t be shy' [sic]" ZeroFox said.

Here are a few examples:

  • I posted another #naked photo

  • I want to #fondle me?

  • I want to take my #virgin?

  • Meow, I want to have sex

  • Want a vulgar, young man?

The bots would engage directly with the victims by quoting one of their tweets or "attracting targets to the payload visible on their profile bio or pinned tweet," researchers said.

In order to get around anti-spam services, the accounts would disguise the URLs through a laundering procedure. The URL would get shortened through Twitter (t.co), then the short link would get redirected to a goog.gl URL, in order to bypass both Twitter and Google's anti-spam detection.

Original image replaced with Mashable logo
Original image has been replaced. Credit: Mashable

The links would redirect users to other adult websites which encourage them to sign up for subscription pornography, webcam, or fake dating websites. These websites are themselves scams.

ZeroFOX researchers reported that two out of five of the domains tweeted by SIREN are connected to Deniro Marketing, a company identified by Brian Krebs as being associated with a large email spam porn campaign.

The company believes the botnet was originated from Eastern Europe.

The Twitter profiles and posts were reported to Twitter security team who subsequently removed them.

Mashable Potato

Recommended For You
Age-verification is hurting sex educators and sex workers, studies suggest
pixelated image of two men embracing with age gate in front of it

Get 2 free months of unlimited listening when you sign up for Amazon Music Unlimited
Amazon Music Unlimited logo with teal and orange background

Get Surfshark One for under $2.30 per month with 3 extra months for free
Surfshark on multiple devices

Psst: You can still get 3 months of Audible Premium Plus for 99 cents per month
Audible app on phone with earbuds attached

Streaming deal alert: Get 3 months of MUBI for only $1
Demi Moore, Jennifer Lawrence, and Lili Reinhart with MUBI logo

Trending on Mashable
NYT Connections hints today: Clues, answers for April 3, 2026
Connections game on a smartphone

Wordle today: Answer, hints for April 3, 2026
Wordle game on a smartphone

Google launches Gemma 4, a new open-source model: How to try it
Google Gemma

NYT Strands hints, answers for April 3, 2026
A game being played on a smartphone.

The biggest stories of the day delivered to your inbox.
These newsletters may contain advertising, deals, or affiliate links. By clicking Subscribe, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up. See you at your inbox!