Security News > 2022 > September > How botnet attacks work and how to defend against them
This is how it works: when a flaw is detected in routers of a particular brand or model, attackers scan the networks and install malware on the routers in large quantities to launch attacks from them.
The number of such attacks grows every year, the volume of incoming traffic increases, and, as a result, the load on the security perimeter is becoming heavier.
DDOS protection-this level includes solutions for protection against L3/L4 volumetric attacks.
How eBPF blocks attacks at L3-L4. In the event of serious attacks, integration with eBPF is activated, which blocks attacks on L3-L4. Thus, we also reduce the risk of overloading the filtering center.
Enable protection against bots and other types of attacks.
Gcore users have comprehensive protection: both from general attacks, such as volumetric DDoS, and from attacks that can be masked or mixed with legitimate traffic.
News URL
Related news
- FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks (source)
- Malware botnets exploit outdated D-Link routers in recent attacks (source)
- Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks (source)
- Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Devices (source)
- Mirai botnet behind the largest DDoS attack to date (source)
- New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks (source)