What is a Smurf Attack? How Does It Work?

DDoS, Smurf attack, DDoS attack

Smurfing, or smurf attack, is a kind of DDoS attack. It has a pretty easy mechanism, but counteracting it may be as hard as it could be with the most sophisticated types of denial attacks. Let’s check how that works, and figure out how to mirror that attack as well as decrease the chances to… Continue reading What is a Smurf Attack? How Does It Work?

Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites

Ukrainian Computer Emergency Response Team (CERT-UA) said that Ukraine was hit by large-scale DDoS attacks. CERT-UA has published a report on ongoing DDoS attacks on Ukrainian websites and a government web portal. Unknown attackers compromise WordPress sites and inject malicious JavaScript code into the HTML structure. The script is base64 encoded to avoid detection like… Continue reading Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites

Akamai Researchers Say DDoS Attacks Amplification for 4 Billion Times

This week, Akamai experts discovered a unique DDoS amplification vector that can achieve a 4.3 billion to one attack repelling or amplification ratio. The new attack vector is based on the abuse of unprotected Mitel MiCollab and MiVoice Business Express systems, which act as gateways between virtual PBXs and the Internet and have a dangerous… Continue reading Akamai Researchers Say DDoS Attacks Amplification for 4 Billion Times

Akamai Says Powerful DDoS Attacks Are Becoming the Norm

According to Akamai’s calculations, powerful ransomware DDoS attacks are becoming the norm. Although they fall short of past records (recall last year’s 2.54 TB/sec attack or 1.35 TB/sec attack in 2018), it’s still a big problem. The fact is that three recent attacks are among the six largest DDoS attacks ever detected by Akamai. Experts… Continue reading Akamai Says Powerful DDoS Attacks Are Becoming the Norm

Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

The well-known information security expert, journalist and author of the KrebsOnSecurity blog has repeatedly become a target for attacks and mockery of hackers. Now hackers are attack Microsoft Exchange servers with Proxylogon vulnerabilities on behalf of Brian Krebs. The fact is that Krebs is famous for his investigations and revelations, and over the long years… Continue reading Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

Attackers using DCCP protocol for DDoS attacks

Akamai has noticed that attackers are using the little-known DCCP network protocol (Datagram Congestion Control Protocol) for DDoS attacks. This internet standard was approved in 2007 and helps monitoring network congestion for UDP-based communications. DCCP is especially effective for applications where data arriving at the wrong time becomes useless. For example, streaming, online gaming, and… Continue reading Attackers using DCCP protocol for DDoS attacks

DTLS can amplify DDoS by 37 times

Netscout warns that using of the DTLS vector allows hackers to amplify DDoS attacks by 37 times. The researchers found that criminals are using a relatively new vector for amplifying DDoS attacks: the Datagram Transport Layer Security (DTLS) protocol, which provides connection security for protocols using datagrams. DTLS, like other UDP-based protocols, is susceptible to… Continue reading DTLS can amplify DDoS by 37 times

REvil spokesman boasts that hackers have access to ballistic missile launch systems

A Revil representative under the pseudonym Unknown, claims that the hackers, partners in the use of malware, have access to ballistic missile launch systems. Cybercriminal group REvil operates on the RaaS ransomware-as-a-service business model, in which attackers offer malware to partners who use it to block devices and encrypt organizations’ data. A REvil spokesperson under… Continue reading REvil spokesman boasts that hackers have access to ballistic missile launch systems

Google revealed the most powerful DDoS attack in history

This week, the Google Cloud team talked about a previously unknown DDoS attack that targeted a Google service back in September 2017 and peaked at 2.54 TB/sec, making it the most powerful recorded attack in history. Soon, analysts from the Google Threat Analysis Group (TAG) published their report on the incident, in which they said… Continue reading Google revealed the most powerful DDoS attack in history

Lucifer malware uses many exploits, is engaged in mining and DDoS attacks

Palo Alto Networks experts have prepared a report on Lucifer malware, which uses many exploits and, according to experts, “wreaks havoc” on Windows hosts. It is noted that the authors of the malware themselves named their brainchild Satan DDoS, but information security experts call it Lucifer to distinguish it from the Satan cryptographer. The Lucifer… Continue reading Lucifer malware uses many exploits, is engaged in mining and DDoS attacks