Category Archives: DDoS News

Fortinet’s week to forget: Critical vulns, disclosure screw-ups, and that toothbrush DDoS attack claim

An orchestra of fails for the security vendor We’ve had to write the word “Fortinet” so often lately that we’re considering making a macro just to make our lives a little easier after what the company’s reps will surely agree has been a week sent from hell.…

Taken from:
Fortinet’s week to forget: Critical vulns, disclosure screw-ups, and that toothbrush DDoS attack claim

FBI: Give us warrantless Section 702 snooping powers – or China wins

Never mind the court orders obtained to thwart Volt Typhoon botnet Analysis   The FBI’s latest PR salvo, as it fights to preserve its warrantless snooping powers on Americans via FISA Section 702, is more big talk of cyberattacks by the Chinese government.…

Read More:
FBI: Give us warrantless Section 702 snooping powers – or China wins

FBI disrupts Chinese botnet used for targeting US critical infrastructure

The FBI has disrupted the KV botnet, used by People’s Republic of China (PRC) state-sponsored hackers (aka “Volt Typhoon”) to target US-based critical infrastructure organizations. A botnet for probing critical infrastructure organizations The threat actors used the KV botnet malware to hijack hundreds of US-based, privately-owned small office/home office (SOHO) routers and to hide their hacking activity towards “US and other foreign victims”. “The Volt Typhoon malware enabled China to hide, among other things, pre-operational … More ? The post FBI disrupts Chinese botnet used for targeting US critical infrastructure appeared first on Help Net Security .

More here:
FBI disrupts Chinese botnet used for targeting US critical infrastructure

FBI confirms it issued remote kill command to blow out Volt Typhoon’s botnet

Remotely disinfects Cisco and Netgear routers to block Chinese critters China’s Volt Typhoon attackers used “hundreds” of outdated Cisco and NetGear routers infected with malware in an attempt to break into US critical infrastructure facilities, according to the Justice Department.…

See the article here:
FBI confirms it issued remote kill command to blow out Volt Typhoon’s botnet

FBI: Beware of thieves building Androxgh0st botnets using stolen creds

Infecting networks via years-old CVEs that should have been patched by now Crooks are exploiting years-old vulnerabilities to deploy Androxgh0st malware and build a cloud-credential stealing botnet, according to the FBI and the Cybersecurity and Infrastructure Security Agency (CISA).…

Visit site:
FBI: Beware of thieves building Androxgh0st botnets using stolen creds

Consumers prepared to ditch brands after cybersecurity issues

In 2023, businesses have been hit with 800,000 cyberattacks, over 60,000 of which were DDoS attacks and 4,000 falling victim to ransomware, according to Vercara. The research found that consumers hold nuanced perceptions regarding cybersecurity incidents and are often less aware of the role they play in maintaining cyber hygiene within a business. These findings underscore brand trust’s important role in the digital landscape – with an overwhelming 75% of consumers expressing their readiness to … More ? The post Consumers prepared to ditch brands after cybersecurity issues appeared first on Help Net Security .

Continue Reading:
Consumers prepared to ditch brands after cybersecurity issues

Qakbot returns in fresh assault on hospitality sector

The Qakbot botnet has been disrupted this summer, but cybercriminals are not ready to give up on the malware: Microsoft’s threat analysts have spotted a new phishing campaign attempting to deliver it to targets in the hospitality industry. Qakbot and its (temporary?) downfall Qakbot, also known as Qbot, started as banking malware but has since evolved into a versatile vehicle for malware and ransomware distribution. Its long-term survival and success are attributed to its operators’ … More ? The post Qakbot returns in fresh assault on hospitality sector appeared first on Help Net Security .

View article:
Qakbot returns in fresh assault on hospitality sector

Mirai we go again: Zero-day flaws see routers and cameras co-opted into botnet

Akamai sounds the alarm – won’t name the vendors yet, but there is a fix coming Akamai has uncovered two zero-day bugs capable of remote code execution, both being exploited to distribute the Mirai malware and built a botnet army for distributed denial of service (DDoS) attacks.…

Read More:
Mirai we go again: Zero-day flaws see routers and cameras co-opted into botnet

Mirai malware infects routers and cameras for new botnet

Akamai sounds the alarm – won’t name the manufacturers yet Akamai has uncovered two zero-day bugs capable of remote code execution, both being exploited to distribute the Mirai malware and built a botnet army for distributed denial of service (DDoS) attacks.…

Read More:
Mirai malware infects routers and cameras for new botnet

Mozi botnet murder mystery: China or criminal operators behind the kill switch?

Middle Kingdom or self-immolation – there are a couple of theories The Mozi botnet has all but disappeared according to security folks who first noticed the prolific network’s slowdown and then uncovered a kill switch for the IoT system. But they still have one unanswered question: “Who killed Mozi?”…

Original post:
Mozi botnet murder mystery: China or criminal operators behind the kill switch?