article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

As detailed in my 2014 book, Spam Nation , Spamdot was home to crooks controlling some of the world’s nastiest botnets, global malware contagions that went by exotic names like Rustock , Cutwail , Mega-D , Festi , Waledac , and Grum. And there were many good reasons to support this conclusion.

article thumbnail

Router security in 2021

SecureList

Number of router vulnerabilities according to cve.mitre.org, 2010–2022 ( download ). Number of router vulnerabilities according to nvd.nist.gov, 2010–2022 ( download ). Router-targeting malware. To find out why cybercriminals attack routers, it is first worth looking at the Top 10 malware detected by our IoT traps in 2021.

DDOS 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China using AI to develop robots that can hide in sea launch bombs and cyber attacks

CyberSecurity Insiders

Information is also out that these unmanned vehicles have sophisticated devices installed in them that can launch cyber attacks such as DDoS and malware after connecting to a wireless network.

article thumbnail

Law enforcement and Microsoft join forces to dismantle botnet using LED Light Control Console

Security Affairs

Threat actors used the consoles to deliver malware and ransomware through an IoT botnet that was also used to launch distributed denial-of-service (DDoS) attacks. “One particular IP was associated with dozens of activities related to the distribution of malware, phishing emails, ransomware, and DDoS attacks.”

IoT 71
article thumbnail

The OpenSSL Project addressed three vulnerabilities

Security Affairs

In 2010, the Open SSL project addressed three vulnerabilities, including two DDoS issues rated high severity. Katz and Joel Luellwitz from Trustwave. The issue affects servers using OpenSSL 1.0.2 which are vulnerable to SSL version rollback attacks. If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

DDOS 104
article thumbnail

Protecting Industrial Control Systems Against Cyberattacks – Part 1

Security Boulevard

BlackEnergy is a Trojan capable of distributed denial of service (DDoS), cyber espionage and information destruction attacks. Their tactics went beyond the typical DDoS attack. Industroyer , also called CrashOverride , is believed to be the malware that shut down the power grid in Kiev, Ukraine’s capital, in December 2016.

article thumbnail

DDoS attacks in Q2 2021

SecureList

For example, April saw the active distribution of a new DDoS botnet called Simps — the name under which it introduced itself to owners of infected devices. The malware creators promoted their brainchild on a specially set-up YouTube channel and Discord server, where they discussed DDoS attacks.

DDOS 131