Here's an overview of some of last week's most interesting news, podcasts, videos and articles: What do users look for in a security solution? Users are aware of the dangers in the Internet and …
Category Archives: DDoS News
Wisconsin man cuffed over Koch-blocking DDoS attack
Lawmen respond to Anonymous attack on right-wing moneymen A 37-year-old Wisconsin man has been charged over his alleged involvement in denial-of-service attacks against Koch Industries.…
View article:
Wisconsin man cuffed over Koch-blocking DDoS attack
Bitcoin miners hit back at botnets
Bitcoin miners are hitting back at cyber-thieves attempting to cash in on the popularity of the virtual currency.
Anti-spam Spamhaus up again after 75Gbps Distributed Denial of Service (DDoS) Attacks
The website of non-profit spam fighter Spamhaus is online again after a huge DDoS attack knocked it offline on Sunday, but attackers are continue to target another anti-spam sites that help ISPs combat spam from infected IP addresses. Spamhaus, which provides several anti-spam DNS-based blocklists and maintains the “register of known spam operations”, came under a huge DDoS attack on Sunday, which knocked its web server and mail server offline until Wednesday. Spamhaus spokesperson Luc Rossini on Monday denied a report that Anonymous was behind the attack and pointed to a “Russian criminal malware gang” as the source. On Tuesday Spamhaus sought cover from the attack with DDoS protection provider CloudFlare, which today reported the attack on Spamhaus reached a peak of about 75 gigabits per second. The attackers used a cocktail of DDoS attack methods, but the primary one that helped generate that volume of traffic was a “reflection attack”, according to Matthew Prince, CloudFlare’s CEO. “The basic technique of a DNS reflection attack is to send a request for a large DNS zone file with the source IP address spoofed to be the intended victim to a large number of open DNS resolvers,” Prince explained, noting that 30,000 open DNS resolvers were recorded in the attack, which used spoofed IP addresses CloudFlare had issued to Spamhaus. “The resolvers then respond to the request, sending the large DNS zone answer to the intended victim. The attackers’ requests themselves are only a fraction of the size of the responses, meaning the attacker can effectively amplify their attack to many times the size of the bandwidth resources they themselves control.” Source: http://www.cso.com.au/article/456917/anti-spam_spamhaus_up_again_after_75gbps_ddos_attack/
Read the original:
Anti-spam Spamhaus up again after 75Gbps Distributed Denial of Service (DDoS) Attacks
Researcher ropes poorly protected devices into botnet to map the Internet
A fascinating but technically illegal experiment conducted by an anonymous researcher has witnessed over 420,000 Internet-connected devices being roped into a botnet that functioned as a distributed p…
Read More:
Researcher ropes poorly protected devices into botnet to map the Internet
Fake ad botnet ‘stealing millions’
A web firm finds a network of computers stealing millions of dollars from advertisers by generating fake ad viewings.
Follow this link:
Fake ad botnet ‘stealing millions’
Researcher sets up illegal 420,000 node botnet for IPv4 internet map
Potentially risks thousands of years in jail An anonymous researcher has taken an unorthodox approach to achieve the dream of mapping out the entire remaining IPv4 internet – and in doing so broken enough laws around the world to potentially put him or her behind bars for thousands of years.…
Originally posted here:
Researcher sets up illegal 420,000 node botnet for IPv4 internet map
Old and new botnets behind spam resurgence
Even when they have other capabilities, botnets are primarily used to send out malicious messages, since that is the easiest – not to mention the least risky – way for botmasters to earn money. T…
More here:
Old and new botnets behind spam resurgence
Raspberry Pi Foundation gets hit by a Distributed Denial of Service (DDoS) Attack
Attacked by a million node botnet Raspberry Pi’s website went black after unknown hackers brought it down with a distributed denial of service attack (DDoS). The website has since been restored. “For those interested, this one’s quite hardcore: We’re seeing a SYN flood from a botnet that seems to have about a million nodes,” said Raspberry Pi on Twitter. “This is the second attack in a couple of days. We haven’t had the blackmail email yet. It’s getting plonked when it arrives.” During the attack, the company actively tweeted accounts of the attack, saying they were unable to trace it back to its creator. This, according to Raspberry Pi, is due to the attackers using a “SYN flood” to mask their identities. It believes the attacker is likely an “angry and confused kid” who won’t be able to hold up an expensive attack like this for very much longer. The company is also unable to get in touch with its host given that it is nighttime in the U.K., where Raspberry Pi is based. The general question on Twitter concerning the DDoS is “Why?” Raspberry Pi creates cheap micro PCs, which has caught the eye of many. Its foundation arm is also focused on bringing computer science education to children and is involved in other charities. When asked about why it might be a target, Raspberry Pi tweeted, “Well, we *are* horrid, what with our focus on education and charity and everything. Boo to irritating do-gooders.” Source: http://venturebeat.com/2013/03/05/raspberry-pi-ddos/
Visit link:
Raspberry Pi Foundation gets hit by a Distributed Denial of Service (DDoS) Attack
Radware launches cloud-based DDoS attack mitigation system
At RSA Conference 2013 in San Francisco, Radware announced DefensePipe, an integrated and comprehensive solution to help mitigate volumetric DDoS attacks which threaten to saturate a customer's Intern…
View the original here:
Radware launches cloud-based DDoS attack mitigation system
