Monthly Archives: June 2020

DDoS and dingoes: Australia to bolster cyber-defences with 500 hackers amid China spat

AU$1.35bn fund follows revelations that country was hit by state-run attack Australia will hire 500 hackers as part of a AU$1.35bn (£754m, $925m) boost to protect the nation’s networks from a wave of cyber attacks.…

Read the original:
DDoS and dingoes: Australia to bolster cyber-defences with 500 hackers amid China spat

CyberX, CyberX, does whatever a CyberX does. Locks IoT, machines too, Microsoft got it, so will you

Plus: DDoS’er jailed, and more In Brief   Redmond is bulking up the security around its AzureStack hardware-to-cloud bundle by acquiring infosec firm CyberX.…

View original post here:
CyberX, CyberX, does whatever a CyberX does. Locks IoT, machines too, Microsoft got it, so will you

CyberX, CyberX, does whatever a CyberX does. Locks IoT, machines too, Microsoft got it so you will to

Plus: DDoS’er jailed, and more In Brief   Redmond is bulking up the security around its AzureStack hardware-to-cloud bundle by acquiring infosec firm CyberX.…

Read More:
CyberX, CyberX, does whatever a CyberX does. Locks IoT, machines too, Microsoft got it so you will to

Docker servers infected with DDoS malware in extremely rare attacks

Up until recently, Docker servers misconfigured and left exposed online have been historically targeted with cryptocurrency-mining malware, which has helped criminal groups generate huge profits by hijacking someone else’s cloud resources. However, in a report published this week, security researchers from Trend Micro have discovered what appears to be the first organized and persistent series of attacks against Docker servers that infect misconfigured clusters with DDoS malware. According to Trend Micro, the two botnets are running versions of the XORDDoS and the Kaiji malware strains. Both malware operations have a long and well-documented history, especially XORDDoS, which has been spotted used in the wild for many years. However, the two DDoS botnets had usually targeted routers and smart devices, and never complex cloud setups, such as Docker clusters. “XORDDoS and Kaiji have been known to leverage telnet and SSH for spreading before, so I see Docker as a new vector which increases the potential of the botnet, a green field full of fresh fruit to pick with no immediate competitors,” Pascal Geenens, cybersecurity evangelist at Radwa r e , told ZDNet via email earlier this week. “Docker containers will typically provide more resources compared to IoT devices, but they typically run in a more secured environment, and it might be hard to impossible for the container to perform DDoS attacks,” Geenens added. “The unique perspective of IoT devices such as routers and IP cameras is that they have unrestricted access to the internet, but typically with less bandwidth and less horsepower compared to containers in a compromised environment,” the Radware researcher told ZDNet . “Containers, on the other hand, typically have access to way more resources in terms of memory, CPU, and network, but the network resources might be limited to only one or a few protocols, resulting in a smaller arsenal of DDoS attack vectors supported by those ‘super’ bots.” However, these limitations don’t usually impact crypto-mining botnets, which only need an open HTTPS channel to the outside world, Geenens said. But despite the limitations in how a DDoS gang could abuse hacked Docker clusters, Geenens says this won’t stop hackers from attacking this “green field full of fresh fruit to pick” as there are very few vulnerable IoT devices that haven’t been infected already, which has forced hackers to target Docker servers to begin with. And on a side note, Geenens also told ZDNet that he suspects that DDoS operators are already quite familiar with Docker systems already. While this is the first time they’re hacking Docker clusters, Geenens believes hackers often use Docker to manage their own attack infrastructure. “I have no immediate proof, but I’m pretty sure that in the same way as legitimate applications benefit from [Docker’s] automation and agility (DevOps), so will illegal applications.” The most common source of Docker hacks is the management interface (API) being left exposed online without authentication or being protected by a firewall. For readers looking to secure their servers, that would be a good first thing to check. In its report, Trend Micro also recommends that server administrators secure their Docker deployments by following a series of basic steps, detailed here . Source: https://www.zdnet.com/article/docker-servers-infected-with-ddos-malware-in-extremely-rare-attacks/

Originally posted here:
Docker servers infected with DDoS malware in extremely rare attacks

Honeypot behind sold-off IP subnet shows Cyberbunker biz hosted all kinds of filth, says SANS Institute

Botnet C2, denial-of-service, phishing – and that’s after filtering Web traffic to the servers of the notorious Dutch-German Cyberbunker hosting biz was filled with all kinds of badness, including apparent botnet command-and-control and denial-of-service traffic, says SANS Institute.…

See the original post:
Honeypot behind sold-off IP subnet shows Cyberbunker biz hosted all kinds of filth, says SANS Institute

There are DDoS attacks, then there’s this 809 million packet-per-second tsunami Akamai says it just caught

Bank on the receiving end of massive 418Gbps traffic barrage Akamai reckons it blocked what may be the largest distributed denial-of-service attack ever, in terms of packets per second.…

View article:
There are DDoS attacks, then there’s this 809 million packet-per-second tsunami Akamai says it just caught

Week in review: DDoS attack trends, WannaCry lessons, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Zero-day flaws in widespread TCP/IP library open millions of IoT devices to remote attack 19 vulnerabilities – some of them allowing remote code execution – have been discovered in a TCP/IP stack/library used in hundreds of millions of IoT and OT devices deployed by organizations in a wide variety of industries and sectors. Data Protection Officer independence: Ethical and practical considerations In … More ? The post Week in review: DDoS attack trends, WannaCry lessons, new issue of (IN)SECURE appeared first on Help Net Security .

Read More:
Week in review: DDoS attack trends, WannaCry lessons, new issue of (IN)SECURE

How the pandemic affected DDoS attack patterns, global internet traffic

There has been a shift in internet traffic patterns coinciding with an increase in DDoS and other types of network attacks in recent months as organizations across industries quickly transitioned to remote workforces and individuals under stay-at-home orders began relying on the internet more heavily, according to Neustar. Growing reliance on the internet The pandemic effect was clear in traffic to specific websites, such as the 250% increase in queries for a popular collaboration platform … More ? The post How the pandemic affected DDoS attack patterns, global internet traffic appeared first on Help Net Security .

Read More:
How the pandemic affected DDoS attack patterns, global internet traffic