Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Botnet Mirai in the Dyn DDoS Assault Comprise 100,000 IoT Machines


The cyber assault which disrupted a large extent of USA's Internet recently occurred due to one fresh network of bots known as the Mirai botnet. The entity victimized in the assault was Dyn the provider of 'domain name system' infrastructure. The company faced the blow on October 21, a Friday that continued to last nearly all day, disabling websites like Netflix, The Guardian, Twitter, CNN, Reddit, along with several others across USA and Europe.

Dyn's executive vice-president of product Scott Hilton wrote that the attackers used disguised UDP and TCP traffic through Port 53 along with recursive domain name server retry traffic that even more worsened the impact.

Further according to Dyn, the much doubted Mirai botnet acted the main means for the DDoS (distributed denial of service) assault that occurred in multiple stages while impacting different websites over about a 9-hr period on the day of the attack. Darkreading.com posted this online dated October 26, 2016.

An assessment of the Dyn hack revealed the attackers as altering their assaults' nature many times by making them more sophisticated and rigorous that elongated the disruption. Devices were employed that the Mirai malicious program controlled and compromised online video cameras as well as other IoT (Internet of Things) equipments, so substantiated Dyn.

The IoT devices were used for the hackers to infiltrate the network that comprised the devices. An IoT is nearly always that connection inside the chain that is easiest to compromise.

It is even now not clear who the perpetrators of the Dyn attack are, however according to certain security researchers, probably amateur hackers executed it. During late September 2016, the anonymous Mirai creator published the malware's source code for all hackers, implying that anybody having the slightest hacking ability could work with it.

The domain name server traffic dispatched during the Distributed Denial of Service assaults produced genuine retry traffic of the DDoS, so the assault became more complex. It also produced 10-20 times more traffic of usual DNS levels. The majority of the assaults emerged out of the Mirai botnet that has an army of 100,000 tainted machines.

ยป SPAMfighter News - 11/2/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next