botnet
Radware Threat Researchers Live: Bots, Botnets & Gaming
In the latest episode of Radware Threat Researchers Live, Daniel Smith and Pascal Geenens discuss what's new in botnets. The post Radware Threat Researchers Live: Bots, Botnets & Gaming appeared first on ...
Interplanetary Storm Botnet Shows Signs of Anonymization-Purpose Proxy-for-Hire Infrastructure
While botnets have been used for anything from performing Distributed Denial-of-Service (DDoS) attacks to stealing data and even sending spam, Bitdefender researchers have found signs that the Interplanetary Storm botnet could be ...
Emotet Botnet Named ‘Most Wanted Malware’ for July 2020
The Emotet botnet earned the title of “most wanted” malware family for the month of July 2020 following a period of inactivity. Check Point revealed that Emotet threat activity had affected 5% ...
Kingminer Botnet Keeps up with the Times
The e-currency boom in late 2017 sparked a new type of “gold rush”, as cyber-criminals started racing to infect home computers and data centers with crypto-miners. While digital currencies have fluctuated wildly ...
Man sentenced, two others charged, in connection with Satori IoT botnet
22-year old man from Vancouver, Washington, has been sentenced to a US federal prison for his role in the development of the Satori botnet, which launched distributed denial-of-service (DDoS) attacks from hijacked ...
SSH-Targeting Golang Bots Becoming the New Norm
Bitdefender researchers have recently found an increasing number of SSH-targeting bots written in Golang. Traditionally, popular malware is written in C, C++ and Perl, and it’s rare that we see attackers creating ...
Akamai Discloses Details of Massive DDoS Attack
Akamai this week revealed it mitigated a massive 1.44 terabits-per-second (TBPS) distributed denial of service (DDoS) attack that for nearly two hours reached levels of 385 million packets per second (MPPS). Roger ...
Bad Actors Target Unsecure Databases An Average of 18 Times Per Day, New Research Shows
Many companies accidentally leave their databases exposed on the web, and data breaches or security incidents occur daily. Unsecured and misconfigured servers often lead to data leaks that can become logistical and ...
Ghosting Bots: The Story of Hoaxcalls Failures
The Hoaxcalls campaign has provided a number of opportunities to explore the trials & errors in researching, developing, & building a botnet campaign. The post Ghosting Bots: The Story of Hoaxcalls Failures ...
VictoryGate Monero-Mining Botnet Spread via Infected USB Devices
A previously undocumented botnet called “VictoryGate” propagated via infected USB devices in order to perform Monero-mining functionality. Slovakian security firm ESET revealed that it had sinkholed several command-and-control (C&C) domains so that ...

