article thumbnail

Muddling Meerkat, a mysterious DNS Operation involving China’s Great Firewall

Security Affairs

The threat actors appear to have the capability to control China’s Great Firewall and were observed utilizing a novel technique involving fake DNS MX records. However, low-volume attacks resembling Slow Drip DDoS attacks have persisted since then. However, the Infoblox researchers have yet to discover the motivation behind the attacks.

DNS 130
article thumbnail

Great Firewall Ready to Unleash ‘Gigantic’ DDoS—so are Other Middleboxes

Security Boulevard

The post Great Firewall Ready to Unleash ‘Gigantic’ DDoS—so are Other Middleboxes appeared first on Security Boulevard. Researchers have disclosed a nasty new way for bad people to mess up the internet for the rest of us.

Firewall 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fake DDoS protection pages on compromised WordPress sites lead to malware infections

Security Affairs

Threat actors compromise WordPress sites to display fake Cloudflare DDoS protection pages to distribute malware. DDoS Protection pages are associated with browser checks performed by WAF/CDN services which verify if the site visitor is a human or a bot. The file poses as a tool required to bypass the DDoS verification.

DDOS 97
article thumbnail

Widespread exploitation by botnet operators of Zyxel firewall flaw

Security Affairs

Threat actors are actively exploiting a command injection flaw, tracked as CVE-2023-28771, in Zyxel firewalls to install malware. Threat actors are actively attempting to exploit a command injection vulnerability, tracked as CVE-2023-28771 , that impacts Zyxel firewalls. in its firewall devices.

article thumbnail

Multiple DDoS botnets were observed targeting Zyxel devices

Security Affairs

Researchers warn of several DDoS botnets exploiting a critical flaw tracked as CVE-2023-28771 in Zyxel devices. Fortinet FortiGuard Labs researchers warned of multiple DDoS botnets exploiting a vulnerability impacting multiple Zyxel firewalls. Mirai botnets are frequently used to conduct DDoS attacks.”

DDOS 98
article thumbnail

Massive increase in XorDDoS Linux malware in last six months

Malwarebytes

Based on a case study in 2015 , Akamai strengthened the theory that the malware may be of Asian origin based on its targets. Microsoft said that XorDDoS continues to home on Linux-based systems, demonstrating a significant pivot in malware targets. Such powerful attacks are no longer conducted just to disrupt.

Malware 138
article thumbnail

How to Stop a DDoS Attack on Your Website

SiteLock

In a matter of minutes, a distributed denial-of-service — or DDoS — attack can bring your website traffic to a grinding halt. DDoS attacks are growing in both size and frequency. Recovering from an DDoS attack like this could cost a small business hundreds of thousands of dollars. Why Is a DDoS Attack Destructive?

DDOS 98