Security News
![Mirai Botnet Hits Wynncraft Minecraft Server with 2.5 Tbps DDoS Attack](/static/build/img/news/mirai-botnet-hits-wynncraft-minecraft-server-with-2-5-tbps-ddos-attack-small.jpg)
Web infrastructure and security company Cloudflare disclosed this week that it halted a 2.5 Tbps distributed denial-of-service attack launched by a Mirai botnet. Characterizing it as a "Multi-vector attack consisting of UDP and TCP floods," researcher Omer Yoachimik said the DDoS attack targeted the Minecraft server Wynncraft in Q3 2022.
![How botnet attacks work and how to defend against them](/static/build/img/news/how-botnet-attacks-work-and-how-to-defend-against-them-small.jpg)
This is how it works: when a flaw is detected in routers of a particular brand or model, attackers scan the networks and install malware on the routers in large quantities to launch attacks from them. The number of such attacks grows every year, the volume of incoming traffic increases, and, as a result, the load on the security perimeter is becoming heavier.
![Emotet Botnet Started Distributing Quantum and BlackCat Ransomware](/static/build/img/news/emotet-botnet-started-distributing-quantum-and-blackcat-ransomware-small.jpg)
The Emotet malware is now being leveraged by ransomware-as-a-service groups, including Quantum and BlackCat, after Conti's official retirement from the threat landscape this year. Emotet started off as a banking trojan in 2014, but updates added to it over time have transformed the malware into a highly potent threat that's capable of downloading other payloads onto the victim's machine, which would allow the attacker to control it remotely.
![Emotet botnet now pushes Quantum and BlackCat ransomware](/static/build/img/news/emotet-botnet-now-pushes-quantum-and-blackcat-ransomware-small.jpg)
While monitoring the Emotet botnet's current activity, security researchers found that the Quantum and BlackCat ransomware gangs are now using the malware to deploy their payloads. "The Emotet botnet has fueled major cybercriminal groups as an initial attack vector, or precursor, for numerous ongoing attacks," security researchers at intelligence company AdvIntel said.
![Mirai Variant MooBot Botnet Exploiting D-Link Router Vulnerabilities](/static/build/img/news/mirai-variant-moobot-botnet-exploiting-d-link-router-vulnerabilities-small.jpg)
A variant of the Mirai botnet known as MooBot is co-opting vulnerable D-Link devices into an army of denial-of-service bots by taking advantage of multiple exploits. "If the devices are compromised, they will be fully controlled by attackers, who could utilize those devices to conduct further attacks such as distributed denial-of-service attacks," Palo Alto Networks Unit 42 said in a Tuesday report.
![Moobot botnet is coming for your unpatched D-Link router](/static/build/img/news/moobot-botnet-is-coming-for-your-unpatched-d-link-router-small.jpg)
The Mirai malware botnet variant known as 'MooBot' has re-emerged in a new attack wave that started early last month, targeting vulnerable D-Link routers with a mix of old and new exploits. MooBot was discovered by analysts at Fortinet in December 2021, targeting a flaw in Hikvision cameras to spread quickly and enlist a large number of devices into its DDoS army.
![New Orchard Botnet Uses Bitcoin Founder’s Account Info to Generate Malicious Domains](/static/build/img/news/new-orchard-botnet-uses-bitcoin-founders-account-info-to-generate-malicious-domains-small.jpg)
A new botnet named Orchard has been observed using Bitcoin creator Satoshi Nakamoto's account transaction information to generate domain names to conceal its command-and-control infrastructure. Orchard is said to have undergone three revisions since February 2021, with the botnet primarily used to deploy additional payloads onto a victim's machine and execute commands received from the C2 server.
![IoT Botnets Fuels DDoS Attacks – Are You Prepared?](/static/build/img/news/iot-botnets-fuels-ddos-attacks-are-you-prepared-small.jpg)
The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies DDoS attacks today. Cybercriminals use botnets for various malicious purposes, most significantly for DDoS attacks against targets.
![This Cloud Botnet Has Hijacked 30,000 Systems to Mine Cryptocurrencies](/static/build/img/news/this-cloud-botnet-has-hijacked-30000-systems-to-mine-cryptocurrencies-small.jpg)
The 8220 cryptomining group has expanded in size to encompass as many as 30,000 infected hosts, up from 2,000 hosts globally in mid-2021. "8220 Gang is one of the many low-skill crimeware gangs we continually observe infecting cloud hosts and operating a botnet and cryptocurrency miners through known vulnerabilities and remote access brute forcing infection vectors," Tom Hegel of SentinelOne said in a Monday report.
![Hacking group '8220' grows cloud botnet to more than 30,000 hosts](/static/build/img/news/hacking-group-8220-grows-cloud-botnet-to-more-than-30000-hosts-small.jpg)
A cryptomining gang known as 8220 Gang has been exploiting Linux and cloud app vulnerabilities to grow their botnet to more than 30,000 infected hosts. The group is a low-skilled, financially-motivated actor that infects AWS, Azure, GCP, Alitun, and QCloud hosts after targeting publicly available systems running vulnerable versions of Docker, Redis, Confluence, and Apache.