Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Author of DDoS Botnet Source-Code Leaks Code after Hacking Krebs-on-Security Blog

A hacker recently published a malware's source code which was used for launching a series of distributed denial of service (DDoS) assaults targeting 'Krebs on Security' name of a security blog, and a globally largest hosting provider 'OVH.'

It was in end week of September that the code's leakage was declared on Hackforums an English-language website for hackers. The malware named 'Mirai' proliferates onto computers inflicted with security flaws by constantly combing the Net to find IoT systems that are safeguarded with hard-coded else factory default usernames and passwords.

Independent security researcher Brian Krebs' website KrebsonSecurity suddenly encountered one DDoS assault which started 8pm US Eastern time. A DDoS assault is an attack wherein trivial requests swamp a PC-server thus uncontrollably preventing legitimate ones reaching it. It's known as distributed since the toxic pings, which arrive, have their sources from many PCs situated globally rather than any single PC located at any one point which are already compromised and amalgamated in a botnet that is responsible for directing the innumerable requests towards the chosen server so that it can be derailed. One can imagine it as certain huge collection of digital hornets overpowering certain wild-beast.

Apparently, Mirai along with another program are two malware groups which at present help to fast put together extremely big IoT-based DDoS botnets. The other malware called 'Bashlight' works likewise Mirai because it too contaminates IoT computers through auto-generated usernames and passwords, Krebsonsecurity.com posted this, October 2, 2016.

Researchers estimate that the botnet contains more than 145,000 contaminated IoT systems and it was possibly rented out to various attackers that utilized it to hack into Krebs' online site. Reportedly, Mirai has pulled systems presently counting merely 300,000, with the number continuing to fall.

In spite of that, it's not clear why the attacker went about leaking Mirai's source-code. A probable answer is that as it's so widely revealed, more hackers would get to own it which would make it difficult locating the original author. Moreover, as it's capable of increasing the number of infected IoT systems, criminal hackers would find in it a profitable asset.

» SPAMfighter News - 10/6/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page