Tag: IoT botnet
You are here: Home \ IoT botnet \ Page 2
A buffer overflow found in the Mirai botnet could eliminate its ability to carry out HTTP flood attacks. But exploiting that vulnerability puts defenders in a gray area with regard to hacking back.
Analysis by DNS provider Dyn hints that more than 1 terabyte per second of traffic may have been used in last week’s massive DDoS attack that impacted Internet service on the East Coast.
Researchers at Flashpoint said Friday’s DDoS attack against DNS provider Dyn was likely the work of script kiddies and not advanced attackers.
Millions of IP-enabled cameras built on gear manufactured by Hangzhou Xiongmai of China is being recalled after DDoS attacks powered by compromised IOT devices took down a major DNS provider last week.
Ten percent of the 550,000 IoT nodes in the Mirai botnet are involved in ongoing DDoS attacks against DNS provider Dyn and others.
The IoT botnet behind the some of the largest publicly recorded DDoS attacks is flooding its targets with HTTP traffic in Layer 7 attacks.
Researchers sort out what went wrong when an estimated 500,000 DVRs and IP-based cameras were used in a series of massive DDoS attacks in September.
DVR’s, IP-enabled cameras, home cable equipment and many other IOT connected devices are that latest in potent DDoS tools available to attackers.
An attacker known as Anna-senpai released source code for the Mirai malware, which was used in a 620 Gbps DDoS attack against Krebs on Security.