Remove Cybercrime Remove DDOS Remove Firmware
article thumbnail

KrebsOnSecurity Hit By Huge New IoT Botnet “Meris”

Krebs on Security

On Thursday evening, KrebsOnSecurity was the subject of a rather massive (and mercifully brief) distributed denial-of-service (DDoS) attack. But on Thursday DDoS protection firm Qrator Labs identified the culprit — “Meris” — a new IoT monster that first emerged at the end of June 2021. In its Aug.

IoT 341
article thumbnail

DDoS attacks in Q4 2020

SecureList

After the attacks came to light, the manufacturer promptly released a firmware update for configuring verification of incoming requests. In December, Canada’s Laurentian University reported a DDoS attack. Educational institutions are recommended to use anti-DDoS solutions and strong firewall settings, and partner up with ISPs.

DDOS 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mirai botnet targets SSR devices, Juniper Networks warns

Security Affairs

Threat actors initially compromised the devices, and then employed them in DDoS attacks. These systems have been infected with the Mirai malware and were subsequently used as a DDOS attack source to other devices accessible by their network.” Keep Software Updated : Apply the latest firmware updates to patch vulnerabilities.

DDOS 66
article thumbnail

Yandex is under the largest DDoS attack in the history of Runet

Security Affairs

The Russian internet service provider Yandex is under a massive distributed denial-of-service (DDoS) attack that began last week. The record magnitude of the massive DDoS attack was also confirmed by the US company Cloudflare, which specializes in the protection against such kinds of attacks. SecurityAffairs – hacking, DDoS).

DDOS 137
article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

The researchers found that the botnet comprises MikroTik routers with various firmware versions, including recent ones. ” The botnet size enables diverse attacks, from DDoS to phishing, spreading malware via SOCKS proxies, and amplifying C2 operations while masking attackers’ identities.

DNS 139
article thumbnail

Aquabot variant v3 targets Mitel SIP phones

Security Affairs

A new variant of the Mirai-based botnet Aquabot targets vulnerable Mitel SIP phones to recruit them into a DDoS botnet. Aquabot is a Mirai-based botnet designed for DDoS attacks. In mid-July 2024, Mitel addressed the vulnerability with the release of firmware updates. HF1 (R6.4.0.136). ” continues the report.

DDOS 67
article thumbnail

Moobot botnet spreads by exploiting CVE-2021-36260 flaw in Hikvision products

Security Affairs

The vulnerability is an unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware, it was discovered by a security researcher that goes online with the moniker “Watchful IP.”. The expert pointed out that every firmware developed since 2016 has been tested and found to be vulnerable.

Firmware 144