6 links
tagged with all of: cybersecurity + botnet
Click any tag below to further narrow down your results
Links
A new botnet named Androxgh0st is expanding its operations by exploiting vulnerabilities in university servers in the United States. The botnet is capable of executing various malicious activities, raising concerns about its potential impact on educational institutions and cybersecurity.
Akirabot has been identified as a malicious bot that spammed approximately 80,000 websites, primarily by exploiting vulnerabilities in outdated content management systems. The attack highlights the ongoing threat of automated bots in the cybersecurity landscape and emphasizes the need for regular updates and security measures.
QRator Labs has developed a solution to mitigate Layer 7 DDoS attacks using a botnet of 5.76 million compromised devices. Their approach focuses on enhancing server resilience by employing advanced filtering techniques that distinguish between legitimate traffic and malicious requests, effectively reducing the impact of such attacks on targeted websites.
Operation Moonlander has successfully dismantled a significant botnet responsible for the cybercriminal services AnyProxy and 5Socks. This operation highlights the ongoing efforts to combat malware and cybercrime on a global scale, emphasizing the need for continuous vigilance and collaboration among cybersecurity entities.
KrebsOnSecurity experienced a massive 6.3 Tbps DDoS attack, believed to be a test of the Aisuru botnet, which consists of compromised IoT devices. This attack, lasting less than a minute, highlights the growing threat posed by sophisticated botnets and the involvement of individuals like "Forky," who has connections to multiple DDoS-for-hire services. Despite the attack's scale, KrebsOnSecurity remained operational due to its DDoS protection measures.
Over 9,000 ASUS routers have been compromised by a botnet called "AyySSHush," which exploits an old command injection vulnerability to establish a persistent SSH backdoor. The attackers employ stealth tactics, including bypassing authentication and disabling logging, while the exact purpose of the campaign remains unclear. ASUS has released security updates, urging users to upgrade their firmware and check for unauthorized access.