You searched for distributed denial-of-service/ | SC Media

Your search for distributed denial-of-service/ returned 40 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove

Your search for distributed denial-of-service/ returned 40 results

Sort Results:

Relevant Recent
Malware, Security News

The Outlaw hacking group back to spreading cryptominers and backdoors

The Outlaw hacking group was detected in the early stages of a botnet campaign spreading Monero miners bundled with Perl-based backdoors. Researchers believe those behind the campaign are still in their testing phase although infection attempts have been spotted in China, according to a June 13 Trend Micro blog post. The malware gains access to…
Government/Defense, Security News

Iranian internet attacked Saturday, knocked partially offline

An extensive, several-hour-long interruption to Iran’s telecom infrastructure and internet hit that took place on February 8 that was likely caused by a distributed denial of service (DDoS) attack. The non-governmental organization Netblocks reported that at 11:45 a.m. local time Iranian internet connectivity from that country’s primary network operators was down by 25 percent eventually…
Cybercrime, Security News, Web Services Security, E-Commerce Security

DDoS attack sidelines AWS DNS web service for hours

Amazon Web Services’ Router 53 domain name system (DNS) service was waylaid by a prolonged distributed denial of service attack earlier this week, affecting a number of online sites and services that rely on AWS. According to multiple reports, a flood of fake traffic disrupted legitimate attempts to resolve DNS requests to connect to Amazon…
Cybercrime, Gaming, Network Security, Security News

Attackers leveraging WS-Discovery protocol to amplify attacks

A recently discovered distributed denial of service technique that abuses the Web Services Dynamic Discovery specification is being executed in the wild by multiple threat actors to amplify the effects of their attacks, researchers have warned. The technique is a User Datagram Protocol (UDP) Amplification technique that involves spoofing requests to the WS-Discovery service. WS-Discovery…
Network Security, Privacy & Compliance News and Analysis, Security News

Telegram blames China for DDoS disruptions during Hong Kong unrest

Telegram pointed the finger at Chinese state-sanctioned actors yesterday after a distributed denial of service (DDoS) attack overwhelmed its servers as protests were taking place in Hong Kong. “We’re currently experiencing a powerful DDoS attack, Telegram users in the Americas and some users from other countries may experience connection issues,” the encrypted messaging service said…
Cybercrime, Malware, Security News

‘Outlaw’ threat actor uses Shellbot variant to form new botnet

An unknown threat actor has been targeting organizations with botnet malware that communicates with its command-and-control server via the Internet Relay Chat application layer protocol. Nicknamed Outlaw, the hacking group developed the botnet as a Perl language-based variant of Shellbot, according to a Nov. 1 blog post from Trend Micro, whose researchers uncovered the threat. Shellbot is…
Security News

Resilience improved, but response dragged down by too many tools, too few playbooks, report says

While cybersecurity resilience has largely improved over five years, most organizations – 74 percent – say their security response plans are ad-hoc, applied inconsistently or are non-existent even as 13 percent say their ability to contain an attack has declined, a report on resiliency found. Organizations have too many security tools and not enough specific…
Malware, Security News

Bashlight’s back Alright, with new features!

The Bashlight IoT malware has been updated with cryptomining and backdoor commands targeting WeMo devices. The malware initially gained notoriety for its use in large scale DDoS attacks in 2014 but has recently switched over to infecting IoT devices and has even been known to exploit Shellshock to gain a foothold into vulnerable devices. Bashlight…
Cryptocurrency, Cybercrime, IoT, Malware, Security News

Attackers distill essence of Mirai IoT botnet into LiquorBot malware

Researchers recently uncovered another descendant of the Mirai Internet of Things botnet, this one featuring Monero cryptocurrency mining capabilities. Dubbed LiquorBot, the botnet malware is written in Go programming language and seems to use the same command-and-control infrastructure as Mirai. Sometimes, attack campaigns have even paired both LiquorBot and Mirai together in malicious dropper scripts,…
Next post in Security News