Tag Archives: whitepapers

IoT botnet bypasses firewalls to get to ZyXEL modems

NewSky Security’s honeypots have detected a new IoT botnet in the making. The botnet was named DoubleDoor, as it leverages two distinct backdoors to get to the target: ZyXEL PK5001Z modems. The DoubleDoor attacks What’s interesting about this particular botnet is that it’s ready to pass an extra layer of security to get to the modem: Juniper Networks’ NetScreen hardware firewall devices. To pull off the attack, it employs exploits for two vulnerabilities: CVE-2015–7755, which … More ?

Visit link:
IoT botnet bypasses firewalls to get to ZyXEL modems

Android devices roped into new Monero-mining botnet

A new Monero-mining bot sprang up a few days ago and, in just a few days, has created a botnet consisting of over 7,000 Android devices, most of which are located in China (39%) and Korea (39%). Spreading capabilities The rise of the botnet has been flagged by researchers with Qihoo 360’s Netlab, who analyzed the mining malware and discovered that it has worm-like spreading capabilities. Once ADB.miner – as they’ve dubbed the threat – … More ?

Read More:
Android devices roped into new Monero-mining botnet

Brit behind Titanium Stresser DDoS malware sent to chokey

20-year-old Herts man slapped with two years’ stripey suntan time A Hertfordshire man has been jailed for two years after netting nearly £400,000 from the malware he wrote as a 15-year-old student.…

See more here:
Brit behind Titanium Stresser DDoS malware sent to chokey

‘Amnesia’ IoT botnet feasts on year-old unpatched vulnerability

New variant of ‘Tsunami’ is a disaster waiting to happen Hackers have brewed up a new variant of the IoT/Linux botnet “Tsunami” that exploits a year-old but as yet unresolved vulnerability.…

View article:
‘Amnesia’ IoT botnet feasts on year-old unpatched vulnerability

Web smut seekers take resurgent Ramnit malware from behind

? Botnet knocked down, but it gets up again ? Aficionados of salacious smut sites in the UK and Canada are picking up some nasty software that infects systems by using corrupted pop-under adverts.…

Read More:
Web smut seekers take resurgent Ramnit malware from behind

World’s worst botnet fiends switch from ransomware to stock scam spam

IT LIVES! Cybercriminals behind the Necurs botnet have reactivated the zombie network and returned to their original business of using compromised machines as conduits for spam distribution.…

More here:
World’s worst botnet fiends switch from ransomware to stock scam spam

DDoSing has evolved in the vacuum left by IoT’s total absence of security

Botnets’ power level over 9,000 thanks to gaping vulnerabilities IoT botnets have transformed the threat landscape, resulting in a big increase in the size of DDoS attacks from 500Gbps in 2015 up to 800Gbps last year.…

See the original article here:
DDoSing has evolved in the vacuum left by IoT’s total absence of security

Operator of DDoS protection service named as Mirai author

Krebs says he’s fingered author of epic IoT web assault code The author of the massive distributed denial-of-service attack malware Mirai, which ropes infected routers and internet of things devices into remotely controlled armies, is a New Jersey man, according to journo Brian Krebs.…

More:
Operator of DDoS protection service named as Mirai author

Google caps punch-yourself-in-the-face malicious charger hack

Another reason to avoid those DEF CON charging stations. Google has capped a dangerous but somewhat obscure boot mode vulnerability that allowed infected PCs and chargers to put top end Nexus phones into denial of service states.…

See the article here:
Google caps punch-yourself-in-the-face malicious charger hack

3… 2…1… and 123-Reg hit by DDoSers. Again

Happy New Year! Updated   Just days into the new year, and poor old 123-Reg is already experiencing problems, this time in the form of a DDoS attack – something it is no stranger to.…

More:
3… 2…1… and 123-Reg hit by DDoSers. Again