Items tagged with botnet

900,000 Deutsche Telekom customers in Germany were hit with an internet outage beginning on Sunday, and IT analysts have concluded that the company was the victim of a hacker attack. The 900,000 affected customers make up roughly 4.5 percent of Deutsche Telekom’s 20 million fixed-line customers.It is believed that the hackers used malicious software known as Mirai. Mirai turns network devices into remotely-controlled “bots” that can be used to launch attacks and target other victims. Remote interfaces allow network technicians to fix customers' routers from far away, but are also susceptible to... Read more...
We recently witnessed a new and disturbing trend in cyber security and that is the widespread hacking of Internet connected devices to initiate DDoS attacks on an unprecedented scale. That is the method that made possible the Mirai botnet that targeted security expert Brian Krebs and his security blog with 620 gigabits per second of traffic, which at the time was a record. It is also what's causing a surge in DDoS attacks, as noted by content delivery network (CDN) Akamai. The CDN made its findings known in a recent security report compiled with data gathered from its intelligence platform. In... Read more...
On Friday, DNS provider Dyn was walloped by a massive DDoS botnet attack which slowed down or completely sidelined major websites like Amazon, Twitter, and The New York Times. The attack was carried out using improperly configured Internet of Things (IoT) devices that were zombified by Mirai malware. In this particular case, however, the majority of the IoT devices used in the botnet were webcams made by China-based XiongMai Technologies. "It’s remarkable that virtually an entire company’s product line has just been turned into a botnet that is now attacking the United States," said Flashpoint... Read more...
Earlier this morning, we reported on the troubling news that the source code for the Mirai IoT DDoS botnet is now out in the open. If you recall, Miari is the botnet that was able to flood KrebsOnSecurity with 620 gigabits per second of traffic using a horde of zombie IoT devices (the attack was so devastating that Akamai cancelled its pro bono hosting arrangement with Brian Krebs). However, with Mirai source code now out for anyone to take advantage of, we may be seeing even more wide-scale DDoS attacks taking place in the future. And while KrebsOnSecurity might not exactly be a site that you... Read more...
Well, this isn't good. The source code for the botnet that took KrebsOnSecurity down by tapping into an unprecedented number of Internet of Things (IoT) devices has been released to the public. It's availability virtually ensures that distributed denial of service (DDoS) attacks equal in size or even larger will follow, creating financial headaches and service disruptions for companies both big and small. Brian Krebs, a renowned security expert and author of the aforementioned blog, recently found his website the target of one of the largest DDoS attacks in history. The massive attack brought in... Read more...
The web is becoming the wild, wild west all over again it seems. You could argue the Internet's always been a potentially dangerous place, but with the proliferation of smart devices becoming increasingly commonplace, cybercriminals now have more points of entry into home networks than ever before. Smart home automation gadgets collectively comprise much of what's referred to as the Internet of Things (IoT), and just like your PC, they can be silently hijacked and enlisted into a botnet, a malicious network of systems under the control of a foreign party. Individually, all these smart lighting,... Read more...
There are two Dorkbots. One is a nerdy group of organizations that sponsor grassroots meetings of artists, engineers, designers, scientists, inventors, and anyone else involved in electronic art. Their motto is "people doing strange things with electricity," and they're cool. We like them. They're not affiliated with the other Dorkbot, which is the name of a botnet that the FBI just broke up.Despite the goofy name, Dorkbot was no laughing matter. Security researchers have been tracking Dorkbot for more than four years, during which time it's grown to infect over 1 million Windows PCs spread across... Read more...
In what sounds like a scene out of one of those (well meaning, but never remotely accurate) cyber-action movies, teams of technicians from Symantec and Microsoft’s Digital Crimes unit wielding a court order from the U.S. District Court in Alexandria, Virginia, were escorted by U.S. Federal Marshals in raids on data centers in New Jersey and Virginia yesterday. Yes, that happened. According to Reuters, the purpose of the raids was to shut down the Bamital botnet by yanking offline servers that had been used to control between 300,000 and 1 million infected PCs as part of a massive click fraud... Read more...
Researchers with Kaspersky Labs have released information on a new botnet they've discovered that dwarfs any previous cyber-espionage efforts as far as its size, scope, and complexity. The new network, dubbed Red October, has sunk its hooks into systems worldwide. The degree of penetration varies from state to state -- in the United States, the leaks were apparently confined to diplomatic offices and embassies, while in Russia, intrusions were picked up in military installations, embassies, nuclear power plants, and in research institutions. Elements of the Red October network have apparently been... Read more...
It's like the wild west all over again, only this time we have the Internet, modern technology, and plumbing. Oh, and Microsoft isn't asking anyone to bring back a head on a platter. The Redmond sheriff is simply asking for "new information that results in the identification, arrest, and conviction" of those responsible for propagating the Rustock botnet. The reward for assisting Microsoft with its hat trick is a cool quarter of a million dollars. That's a lot of coin. The offer "stems from Microsoft's recognition that the Rustock botnet is responsible for a number of criminal activities and serves... Read more...
While much attention is focused on Facebook scams and trojans involving Osama bin Laden's death, Facebook users should be aware of another new way scammers are spreading links to rogue sites.  They have begun to circulate convincing links claiming to be stories from Wired News about the iPhone 5. This scam takes advantage of Facebook’s new social plugin for websites that allow for comments, M86 Security Labs reports.   If a Facebook user clicks on the link, the user is instead sent to a random .info site. M86 says it has documented over 10 of these sites for this particular scam.... Read more...
One of the most active spam bots, Asprox, has a new gimmick for a Trojan it's been e-mailing around for the past six months: Facebook. Its botmasters are trying to cash in on last week's blocked accounts and unfriending frenzy. Wednesday, November 17, was National Facebook Unfriend day, the brainchild of late night talk show comedian Jimmy Kimmel. However, the day before, Facebook confirmed that it was automatically disabling accounts it found to be suspiciously "fake." In the process it said a "bug" made it also disable a bunch of real users' accounts. Lots of information and disinformation began... Read more...
No one enjoys spam. In fact, it's probably one of the most universally hated things on the Internet. Spam senders probably don't even enjoy the spam that they're distributing, and it's safe to think that Microsoft loathes spam more than anyone else. Or at least that's the impression we get from the amount of fighting it went through to land at the place they're at now.A U.S. just recently granted the company's request to do away with a total of 277 Internet domains, which they maintain were used to "command and control" the Waledac botnet. If you aren't aware, a botnet "is a network of infected... Read more...
The eventual creation of botnet(s) based on mobile devices rather than PCs has been theorized about for years, but no such malware has ever appeared in the real world—at least, not until now. Security researchers believe they may have found the first true mobile worm, dubbed "Sexy View" or "Sexy Space" depending on which version of the program one encounters. The infected payload displays many of the characteristics of PC botnet software and is now more sophisticated than other handheld attacks that have appeared to date. The "now," in this case, is important, as Sexy View first hit the radar six... Read more...
1 2 Next