Remove 2020 Remove DDOS Remove Firmware Remove Surveillance
article thumbnail

Overview of IoT threats in 2023

SecureList

Dark web services: DDoS attacks, botnets, and zero-day IoT vulnerabilities Of all IoT-related services offered on the dark web, DDoS attacks are worth examining first. See translation I’m the world’s best-known DDoS attacker for hire (getting ahead of myself here). Botnet based on Medusa, working since 2020.

IoT 101
article thumbnail

IT threat evolution Q3 2021

SecureList

This toolset was in use from as early as July 2020, mainly targeting Southeast Asian entities, including government agencies and telecoms companies. Apart from Trojanized installers, we also observed infections involving use of a UEFI (Unified Extensible Firmware Interface) and MBR (Master Boot Record) bootkit.

Malware 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT trends report Q1 2022

SecureList

Subsequently, DDoS attacks hit several government websites. In 2020, we published private reports featuring LODEINFO, a sophisticated fileless malware first mentioned in a blogpost from JPCERT/CC3. ToddyCat, a relatively new APT actor, is responsible for multiple attacks detected since December 2020. in June 2021.

Malware 137
article thumbnail

Over 100 million Hikvision devices hit by critical cyber vulnerability

CyberSecurity Insiders

China-based video surveillance related product offering company Hikvision has issued a security advisory saying that all those using their security cameras and NVRs must know a critical vulnerability on its devices that could allow hackers to take control of the cameras and use them as bots to launch DDoS or other related attacks.

article thumbnail

Advanced threat predictions for 2024

SecureList

The threat actor used news about the Russo-Ukrainian conflict to trick targets into opening harmful emails that exploited the vulnerabilities (CVE-2020-35730, CVE-2020-12641 and CVE-2021-44026). First, they can carry out actual cyberattacks, including DDoS attacks , data theft or destruction, website defacement, and so on.

Hacking 119