Showing posts with label DDoS-attacks. Show all posts
Showing posts with label DDoS-attacks. Show all posts

Saturday, May 4, 2013

Printers and IP-cameras - an instrument of DDoS-attacks


The old network protocols make printers and IP-cameras into an instrument of DDoS-attacks

According to the experts of Prolexic,  in the distributed attacks directed on refusal in service, old network protocols even more often are used.

They are still supported by almost all connected devices to the Internet. But the peculiarities of these protocols can "trick" the device and get it to send data to the target system.

For example, the protocol NTP of clock synchronization in response to one of the possible queries can be sent to a list of recently connected clients. If you forge the sender's address in the request, the data will be sent to the target system.

Friday, April 26, 2013

The organizer of DDoS-attacks on Spamhaus arrested

In Europe, arrested the organizer of DDoS-attacks on Spamhaus



Spanish police today arrested a Dutchman suspected of organizing large-scale Web-based attacks. 35-year-old man was arrested in Barcelona, ​​at the request of the local prosecutor's office. It is reported that he was one of those who once stood for the largest DDoS-attacks on the anti-spam service Spamhaus. Then the organizers of the attack for a while managed to bring down Spamhaus, which affected the operation of the Internet has led to the slowing down of multiple services.

In addition, immediately after the organization of DDoS-attacks was announced a police investigation aimed at identifying participants in the operation. Now it is reported that the arrested man - Sven Kamfui, owner and manager of the hosting company Cyberbunker, which, as demonstrated by consequence, involved in the attack.

Sunday, April 14, 2013

Massive attack on WordPress based websites


Massive attack, aimed at creating a botnet of websites using WordPress discovered


The last few days in an intense web Brute Force attacks against password guessing accounts for the site based on the engine of free WordPress. Attack is massive and organized using a large botnet.

Became subject to attack sites are checked under a login entry "admin" through the pages / wp-login.php and / wp-admin with about thousands of the most popular passwords. If the selection of the password was successful in WordPress engine introduced backdoor that connects hacked site of the botnet and retains control even after the password change. Struck by the host begins to participate in Brute Force attack to identify other victims, but also can receive commands and perform other actions that are typical of botnets, such as the commission of DDoS-attacks. The current size of the botnet WordPress servers already estimated at more than 90,000 hosts.

Wednesday, April 3, 2013

Market of the protection from DDoS-attacks will grow to $ 870 million


While DDoS-attacks themselves available for ridiculous money, protection costs a hundred times more expensive.

Analyst firm IDC released a study of Worldwide DDoS Prevention Products and Services 2013-2017 Forecast to the assessment of this market segment in 2011-2012 and forecast for 2013-2017 years. Highly relevant research in light of the recent record-DDoS-attacks on Spamhaus, which shook the entire Internet, and even initiated an investigation by the FBI.

According to the IDC, protection from DDoS-attacks - a very promising business, which in the next five years will grow by an average of 18.2% per year, and by 2017 the volume reached 870 million U.S. dollars. This figure includes commercial orders to all companies in the world that will provide services for protection from DDoS-attacks.

Friday, February 22, 2013

DDoS-attacks are becoming more sophisticated


DDoS-attack on the applications will make 25% of all DDoS-attacks in 2013, predict analysts Gartner. The malware in such cases stops the CPU unit and blocks the application.

Experts Gartner notes the increasing level of complexity of hacker attacks, especially for financial institutions and companies involved in e-commerce.

The study also showed increased power DDoS-attacks. In the second half of 2012, DDoS-attacks on a number of U.S. banks have up to 70 GB per second, whereas before, did not exceed 5 GB per second, but even that was enough to paralyze banking site or a payment system. In the future, according to analysts Gartner, power DDoS-attacks will only grow.

Monday, October 15, 2012

Trojan.PWS.Panda.2395 distributed via peer to peer network

"Doctor Web": Trojan.PWS.Panda.2395 distributed via peer to peer network


The company "Doctor Web" informs users of the distribution through peer to peer networks Trojan.PWS.Panda.2395 several malicious programs that use a very interesting mechanism to infect computers.

These programs are capable of massive DDoS-attacks and send spam.

Infection of the victim's computer by using the widespread Trojan Trojan.PWS.Panda.2395. In the first stage of infection by Trojan-supported peer to peer network to a PC victims downloaded the executable file that is encrypted malicious module. After successfully decrypt it launches another module that reads the image in computer memory or other malicious applications detected by Dr.Web anti-virus software as one of the members of the family Trojan.DownLoader.

The program is saved to a user account as an executable file with a random name, and then modifies the registry Windows, to give yourself the ability to automatically run along with the operating system loads.