Countless wannabe hackers are asking for coding help to use Mirai, all collected by Digital Shadows, a cybersecurity firm. These sometimes laughable pleas for help show that launching DDoS has become an attractive activity for hackers of all skills levels, and even those who have no skills, want in.
Full article via Motherboard
Since the emergence of Mirai IoT botnet, there have been a noticeable increase in DDoS attacks (Distributed Denial of Service) and it looks like authorities are eager to take on culprits behind these attacks. In a statement released by Europol’s press service on Monday, it has been announced that Europol itself and with the help of US and other European law enforcement agencies 34 culprits have been arrested and 101 suspects “interviewed and cautioned.”
Read the full article on HackRead
A powerful new botnet is being blamed for massive and sustained DDoS attacks that security researchers at CloudFlare compare to Mirai when it comes to intensity and scope.
Read the full article on Threat Post
Security experts from CloudFlare observed a new botnet that emerged in the wild and it could be dangerous as its predecessor Mirai.
Read the full article on Security Affairs
Since November 23, an unidentified group has been using a massive botnet to launch large DDoS attacks on a daily basis, targeting a small number of targets concentrated on the US west coast.
According to Cloudflare, a company that among other things provides DDoS mitigation services, the attacks aren’t linked to a variant of the Mirai malware that was used in recent months to create massive botnets and launch similar DDoS attacks.
Read the full article on Bleeping Computer
A new version of Mirai — a malware that’s been enslaving poorly secured IoT devices — has found a new victim: vulnerable internet routers from Germany’s Deutsche Telekom. The spread of the new strain of Mirai has caused internet connection problems for close to a million Deutsche Telekom customers, the company reported on Monday [November 28, 2016].
Read more on CSO Online
Rise of booter and stresser services, mostly run on IoT botnets, is fueling DDoS excitement (but the pros aren’t impressed).
Read the full article on Dark Reading
Hackers going by the handle of Popopret and BestBuy (the same hacker was also selling Terrorist database on the darknet) are offering a DDoS-for-hire service where they are renting our Mirai botnet comprising of around 400,000 infected bots. Probably they have made extensive use of the leaked source code of Mirai malware. It must be noted that both these hackers made headlines when they targeted high-profile US government institutions and businesses using GovRAT malware.
Read more on HackRead
Security researchers at MalwareMustDie have discovered a new malware family designed to turn Linux-based insecure Internet of Things (IoT) devices into a botnet to carry out massive DDoS attacks.
Read the full article on The Hacker News