Botnet Attacks: From DDoS to Hivenets and Sextortion

Botnet Attacks: From DDoS to Hivenets and Sextortion
Add to favorites

“Routers exposing UPnP can be configured remotely, without requiring local malware”


“Botnets”, says Ivan Blesa, the director of technology at Noble, a UK-based security firm, “are becoming a cloud service for criminals; easy to hire, at a reasonable cost”. They are also evolving fast: botnet attacks involve more than a “dumb” barrage of server requests from compromised baby monitors, fridges, or routers; the stereotypical DDoS attack that regularly cripples the business networks. Things are far beyond that.


As Blesa adds to Computer Business Review, “We are at the verge of a complete change of perception as to what damage is possible for botnets to inflict.”


Botnet Attacks: From DDoS to Hivenets, and Sextortion 


Radware agrees. The DDoS mitigation specialist predicts a rise in IoT-based botnets upgraded with swarm-based technology to create more efficient attacks. With over one third of internet traffic being bots in 2018, businesses need to be paying attention.


“Swarmbots turn individual IoT devices from ‘slaves’ into self-sufficient bots, which can make autonomous decisions with minimal supervision,” the company wrote this week.


“Hivenets… are self-learning clusters of compromised devices that simultaneously identify and tackle different attack vectors. The devices in the hive can talk to each other and can use swarm intelligence to act together, recruit and train new members.”


I Got (Probably More Than) 21 Problems, and a Botnet Makes them Worse… 


The Open Web Application Security Project (OWASP) recognises 21 specific automated threat events that bots can deploy, ..

Support the originator by clicking the read the rest link below.