Remove 2020 Remove DDOS Remove Firmware
article thumbnail

DDoS attacks in Q4 2020

SecureList

In Q4 2020, Citrix ADC (application delivery controller) devices became one such tool, when perpetrators abused their DTLS interface. After the attacks came to light, the manufacturer promptly released a firmware update for configuring verification of incoming requests. Overall, Q4 remained within the parameters of 2020 trends.

DDOS 145
article thumbnail

New Ttint IoT botnet exploits two zero-days in Tenda routers

Security Affairs

Unlike other IoT DDoS botnets, Ttint implements 12 remote access functions such as Socket5 proxy for router devices, tampering with router firewall and DNS settings, executing remote custom system commands. .” The vulnerability was detailed in July 2020 by the security researchers Sanjana Sarda. ” concludes the report.

IoT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attackers are hacking NSC Linear eMerge E3 building access systems to launch DDoS attacks

Security Affairs

Researchers from SonicWall revealed that hackers are attempting to compromise Linear eMerge E3 smart building access systems to recruit them in a DDoS botnet. CVE-2019-7256 is actively being exploited by DDoS botnet operators. link] #threatintel — Bad Packets Report (@bad_packets) January 10, 2020. 06 and older.

DDOS 98
article thumbnail

Router security in 2021

SecureList

During 2020 and 2021, more than 500 router vulnerabilities were found. The nvd.nist.gov website presents different figures, but they too show a significant increase in the number of router vulnerabilities found in 2020 and 2021. Mirai is not the only DDoS malware to target routers. Make sure to update the firmware.

DDOS 133
article thumbnail

Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways

Security Affairs

“There is no evidence to support any other firmware versions are vulnerable at this point in time and these findings have been shared with Symantec.” Experts first observed the exploitation of the flaw in the wild on April 24, 2020, as part of an evolution of the Hoaxcalls botnet that was first discovered early of April.

IoT 141
article thumbnail

Mukashi, the new Mirai variant that targets Zyxel NAS

Security Affairs

A new variant of the infamous Mirai malware, tracked as Mukashi, targets Zyxel network-attached storage (NAS) devices exploiting recently patched CVE-2020-9054 issue. According to Palo Alto researchers, threat actors exploited the recently patched CVE-2020-9054 vulnerability in Zyxel NAS. The vendor advisory is also available.

DDOS 134
article thumbnail

Pink Botnet infected over 1.6 Million Devices, it is one of the largest botnet ever seen

Security Affairs

The botnet was created to launch DDoS attacks and to insert advertisements in the legitimate HTTP traffic of the victims, most of which are in China (96%). On 2020-01-02, CNCERT reported that “the number of Bot node IP addresses associated with this botnet exceeds 5 million. million devices.