Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Malware of October 21 DDoS Assault Still Posing Trouble


An enormous sized cyber attack, which derailed Netflix, Twitter along with other websites, was carried out with one special type of malware which exploited common consumer devices' power, it's claimed.

The malware called Mirai is not particularly difficult to use while it isn't very expensive also. Authors of this malware posted its source code online making it freely available to anyone plotting to launch an attack.

It is not unknown of DDoS assaults, but the Mirai attack shows how modern technologies' slack security causes extra concern. The latest assault involves Internet-connected devices like webcams, CCTVs, routers and DVRs that created a botnet for executing a consolidated assault against Dyn.

A number of computer security companies account portions of the assault getting executed with botnets built from Bashlite another malware in addition to Mirai. The former malware too is associated with a few of the biggest known distributed denial-of-service assaults till date. Nationalinterest.org posted this, October 27, 2016.

Security investigators from Arbor Networks a company providing DDoS mitigation solutions discovered that certain Mirai variant entertained a backdoor that was remotely controlled as it waited to receive commands via port 103. The actual source-code didn't have that, tells 3 independent security investigators examining the Mirai malicious program.

Usually, a target that's infected with Mirai gets its protocol disabled the connecting link between the target and any entity attempting to reach that target. This new utility lets cyber-crooks, contaminating a device continue controlling it no matter if intervening actors take down their C&C server. However, some quarters believe the function is baseless, possibly a feature that's even counterproductive.

Arbor researchers further stated that ongoing DDoS assaults by Mirai was being noticed all over the world. The infamous malicious program was being primarily used in DDoS-for-hire facilities extending assistance for striking a target, usually by paying in Bitcoins.

Also according to the researchers, several threat actors were customizing as well as enhancing the botnet code's attack capabilities, while more Mirai-based DDoS network-of-bots were getting noticed.

Holding the current attack accountable to one lone sinister actor alternatively a group will certainly pose hazards, if not none at all.

ยป SPAMfighter News - 11/3/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next