HackDig : Dig high-quality web security articles for hacker

The Weaponization of IoT: Rise of the Thingbots

Threat actors use botnets — networks of infected computers or devices — for various cybercriminal purposes, most significantly distributed denial-of-service (DDoS) attacks against predefined targets. Today, botnets with DDoS capabilities are even for sale on the Dark Web. In March 2016, our IBM report, “The Inside Story on Botnets,” explored the
Publish At:2017-04-07 04:20 | Read:4039 | Comments:0 | Tags:Advanced Threats Malware Network & Endpoint Botnets Distribu

The cost of launching a DDoS attack

A distributed denial-of-service (DDoS) attack is one of the most popular tools in the cybercriminal arsenal. The motives behind such attacks can vary – from cyber-hooliganism to extortion. There have been cases where criminal groups have threatened their victims with a DDoS attack unless the latter paid 5 bitcoins (more than $5,000). Often, a DDoS attack is
Publish At:2017-03-23 16:35 | Read:3377 | Comments:0 | Tags:Analysis Featured Publications Botnets DDoS-attacks DDOS

New(ish) Mirai Spreader Poses New Risks

A cross-platform win32-based Mirai spreader and botnet is in the wild and previously discussed publicly. However, there is much information confused together, as if an entirely new IoT bot is spreading to and from Windows devices. This is not the case. Instead, an accurate assessment is that a previously active Windows botnet is spreading a Mirai bot variant
Publish At:2017-02-21 07:15 | Read:9668 | Comments:0 | Tags:Blog Research Botnets Internet of Things Microsoft Windows M

DDoS attacks in Q4 2016

News Overview Without doubt, 2016 was the year of Distributed Denial of Service (DDoS) with major disruptions in terms of technology, attack scale and impact on our daily life. In fact, the year ended with massive DDoS attacks unseen before, leveraging Mirai botnet technology, whose first appearance was covered in our last DDoS Intelligence Report. Since th
Publish At:2017-02-02 20:35 | Read:5147 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports Botnets DDoS-att

Don’t Let Remote Management Software Contribute to Building Botnets

Many IT departments have undergone some serious changes over the last couple of years when it comes to support and management of devices and applications. Mobile users, scattered offices and different virtualization solutions make it almost impossible for IT professionals to maintain traditional on-site support. Spooky Action at a Distance Some corporations
Publish At:2017-01-11 13:40 | Read:2785 | Comments:0 | Tags:Application Security Data Protection Infrastructure Protecti

Is Mirai Really as Black as It’s Being Painted?

The Mirai botnet, which is made up of IoT devices and which was involved in DDoS attacks whose scale broke all possible records, causing denial of service across an entire region, has been extensively covered by the mass media. Given that the botnet’s source code has been made publicly available and that the Internet of Things trend is on the rise, no
Publish At:2016-12-22 10:40 | Read:5094 | Comments:0 | Tags:Blog Research Botnets DDoS-attacks IoT

Home Routers: Mitigating Attacks that can Turn them to Zombies

by Kevin Y. Huang, Fernando Mercês and Lion Gu With more households running smart devices that access the internet, the router is typically their only doorkeeper. And whether an end user has a laptop/desktop and router combo, or a miscellany of other devices connected to the network, the security risks are the same. Based on our research, home routers have b
Publish At:2016-12-14 20:40 | Read:5103 | Comments:0 | Tags:Botnets Internet of Things Vulnerabilities Bitcoin Mining CV

Avalanche: Thwarting Cybercriminal Hazards with Law Enforcement Collaboration

On November 30th, an international law enforcement operation stamped out Avalanche, a large-scale content and management platform designed for the delivery of bullet-proof botnets. Avalanche’s scale and scope spanned victims from 180 countries, over 800,000 domains in 60+ top-level domains (TLD), more than one million phishing and spam e-mails, 500,000 infec
Publish At:2016-12-07 22:10 | Read:4658 | Comments:0 | Tags:Botnets Malware Avalanche banking malware botnet law enforce

New wave of Mirai attacking home routers

Background Starting from yesterday, many DSL customers in Germany were reporting problems with their routers, which weren’t able to connect to their ISP anymore or that the internet connection was very weak. Today we saw news, that a malicious attack could be the reason for this widespread problem. Fortunately we got some more technical details from us
Publish At:2016-11-29 03:45 | Read:3986 | Comments:0 | Tags:Blog Botnets IoT Linux Mirai Router

Inside the Gootkit C&C server

The Gootkit bot is one of those types of malicious program that rarely attracts much attention from researchers. The reason is its limited propagation and a lack of distinguishing features. There are some early instances, including on Securelist (here and here), where Gootkit is mentioned in online malware research as a component in bots and Trojans. However
Publish At:2016-11-12 08:35 | Read:2968 | Comments:0 | Tags:Blog Research Botnets Financial malware Malware Technologies

Kaspersky DDOS intelligence report for Q3 2016

Q3 events Cybercrime as a Service In the last few months the scale of the global ‘Cybercrime as a Service’ infrastructure has been revealed – fully commercialized, with DDoS as one of the most popular services capable of launching attacks the likes of which have never seen before in terms of volume and technological complexity. Against this back
Publish At:2016-11-12 08:35 | Read:3725 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports Botnets DDoS-att

Kaspersky DDoS Intelligence Report for Q1 2016

Q1 events We have selected the events from the first quarter of 2016 that, in our view, illustrate the main trends in the field of DDoS attacks and the tools used to perform them. A record-breaking reflection DDoS attack DDoS attacks using amplification/reflection techniques are still popular and allow cybercriminals to break their peak power records. From
Publish At:2016-04-28 07:20 | Read:3762 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports Botnets DDoS-att

Researchers help shut down spam botnet that enslaved 4,000 Linux machines

A botnet that enslaved about 4,000 Linux computers and caused them to blast the Internet with spam for more than a year has finally been shut down.Further ReadingSpam-blasting malware infects thousands of Linux and FreeBSD serversSophisticated Mumblehard spamming malware flew under the radar for five years.Known as Mumblehard, the botnet was the product of h
Publish At:2016-04-10 02:10 | Read:3452 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab botnets exploi

Beware of Backdoored Linux Mint ISOs

Background Yesterday a blog post on “The Linux Mint Blog” caught our attention. Apparently criminals managed to compromise a vulnerable instance of WordPress which the project used to run their website. The attackers modified download links pointing to backdoored ISO files of Linux Mint 17.3 Cinnamon edition. This “should only impact people
Publish At:2016-02-22 13:55 | Read:3774 | Comments:0 | Tags:Blog Incidents Backdoor Botnets Linux Website Hacks

Kaspersky DDoS Intelligence Report for Q4 2015

Q4 events Of all the Q4 2015 events in the world of DDoS attacks and the tools used to launch them, we picked out those that, in our opinion, best illustrate the main trends behind the evolution of these threats. Emergence of new vectors for conducting reflection DDoS attacks; Increase in number of botnets composed of vulnerable IoT devices; Application-lev
Publish At:2016-01-28 17:05 | Read:4223 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports Botnets DDoS-att


Share high-quality web security related articles with you:)


Tag Cloud