DDoS Booter & IP Stresser

The toolkit of cybersecurity specialists in companies does not consist only of security tools. To imitate the intruders, they apply using the tools like IP stressers. These tools aim at creating an environment and circumstances similar to the real attack. There is also an evil counterpart of IP stressers – DDoS-booters. But how do they… Continue reading DDoS Booter & IP Stresser

What is a Smurf Attack? How Does It Work?

DDoS, Smurf attack, DDoS attack

Smurfing, or smurf attack, is a kind of DDoS attack. It has a pretty easy mechanism, but counteracting it may be as hard as it could be with the most sophisticated types of denial attacks. Let’s check how that works, and figure out how to mirror that attack as well as decrease the chances to… Continue reading What is a Smurf Attack? How Does It Work?

20 Dangerous Types of Cybersecurity Threats 2022

The cybersecurity threats in 2022 are more considerable than ever. Due to the emergence of efficient ransomware, coin miners, spyware, and so on, hacking has become a consistently profitable business. Knowing about cybersecurity threats is crucial because it livens up the safety measures. In addition, when you’re aware of what is up against you on… Continue reading 20 Dangerous Types of Cybersecurity Threats 2022

Russian Aviation agency switched to paper documents due to a hacker attack

The media, citing their own sources, report that at the end of last week, Russian Aviation agency suffered from a hacker attack, after which 65 TB of data was erased and it was necessary to temporarily switch to paper workflow. The Aviatorshchina Telegram channel was the first to report the attack, which wrote that as… Continue reading Russian Aviation agency switched to paper documents due to a hacker attack

Akamai Researchers Say DDoS Attacks Amplification for 4 Billion Times

This week, Akamai experts discovered a unique DDoS amplification vector that can achieve a 4.3 billion to one attack repelling or amplification ratio. The new attack vector is based on the abuse of unprotected Mitel MiCollab and MiVoice Business Express systems, which act as gateways between virtual PBXs and the Internet and have a dangerous… Continue reading Akamai Researchers Say DDoS Attacks Amplification for 4 Billion Times

TeamTNT mining botnet infected over 50,000 systems in three months

Trend Micro warns that since March 2021, the TeamTNT mining botnet from the same-named group has successfully compromised more than 50,000 systems. The TeamTNT group has been active since at least April 2020 and started with attacks on incorrectly configured Docker installations, infecting them with miners and bots for DDoS attacks. Then it became known… Continue reading TeamTNT mining botnet infected over 50,000 systems in three months

Akamai Says Powerful DDoS Attacks Are Becoming the Norm

According to Akamai’s calculations, powerful ransomware DDoS attacks are becoming the norm. Although they fall short of past records (recall last year’s 2.54 TB/sec attack or 1.35 TB/sec attack in 2018), it’s still a big problem. The fact is that three recent attacks are among the six largest DDoS attacks ever detected by Akamai. Experts… Continue reading Akamai Says Powerful DDoS Attacks Are Becoming the Norm

Attackers using DCCP protocol for DDoS attacks

Akamai has noticed that attackers are using the little-known DCCP network protocol (Datagram Congestion Control Protocol) for DDoS attacks. This internet standard was approved in 2007 and helps monitoring network congestion for UDP-based communications. DCCP is especially effective for applications where data arriving at the wrong time becomes useless. For example, streaming, online gaming, and… Continue reading Attackers using DCCP protocol for DDoS attacks

DTLS can amplify DDoS by 37 times

Netscout warns that using of the DTLS vector allows hackers to amplify DDoS attacks by 37 times. The researchers found that criminals are using a relatively new vector for amplifying DDoS attacks: the Datagram Transport Layer Security (DTLS) protocol, which provides connection security for protocols using datagrams. DTLS, like other UDP-based protocols, is susceptible to… Continue reading DTLS can amplify DDoS by 37 times

REvil spokesman boasts that hackers have access to ballistic missile launch systems

A Revil representative under the pseudonym Unknown, claims that the hackers, partners in the use of malware, have access to ballistic missile launch systems. Cybercriminal group REvil operates on the RaaS ransomware-as-a-service business model, in which attackers offer malware to partners who use it to block devices and encrypt organizations’ data. A REvil spokesperson under… Continue reading REvil spokesman boasts that hackers have access to ballistic missile launch systems