Security News

There has been a shift in internet traffic patterns coinciding with an increase in DDoS and other types of network attacks in recent months as organizations across industries quickly transitioned to remote workforces and individuals under stay-at-home orders began relying on the internet more heavily, according to Neustar. The pandemic effect was clear in traffic to specific websites, such as the 250% increase in queries for a popular collaboration platform as lockdowns commenced and the sharp rise in traffic to the website of a N95 masks manufacturer.

The first week of June 2020 arrived with a massive 1.44 TBPS distributed denial of service attack, Akamai reveals. While typical DDoS attacks show geographically concentrated traffic, this assault was different, with the traffic being globally distributed.

Wireless carrier T-Mobile on Monday suffered a major outage in the United States that impacted service at other carriers as well, and it ended up being reported as a "Massive" distributed denial of service attack. Other carriers were also affected by the incident, but reportedly blamed the experienced technical issues on the outage impacting T-Mobile's network.

Rakhshan was sentenced to five years in federal prison and ordered to pay more than $520,000 in restitution. He admitted to conspiring to launch a DDoS attack in January 2015, targeting Leagle.com, a legal aggregation site that had published information about Rakhshan's prior criminal conviction in Canada, and which was hosted by a provider located in Dallas, Texas.

The complexity and size of DDoS attacks in 2019 has increased significantly compared to 2018. A report published by NaWas by NBIP concludes that despite the number of attacks has decreased slightly over 2019, their complexity and size has increased significantly.

A newly disclosed UPnP vulnerability that affects billions of devices can be exploited for various types of malicious activities, including distributed denial-of-service attacks and data exfiltration. Designed to facilitate the automatic discovery and interaction with devices on a network, the UPnP protocol is meant for use within trusted local area networks, as it lacks any form of authentication or verification.

The co-owners of vDOS, a now-defunct service that for four years helped paying customers launch more than two million distributed denial-of-service attacks that knocked countless Internet users and websites offline, each have been sentenced to six months of community service by an Israeli court. A judge in Israel handed down the sentences plus fines and probation against Yarden Bidani and Itay Huri, both Israeli citizens arrested in 2016 at age 18 in connection with an FBI investigation into vDOS. Until it was shuttered in 2016, vDOS was by far the most reliable and powerful DDoS-for-hire or "Booter" service on the market, allowing even completely unskilled Internet users to launch crippling assaults capable of knocking most websites offline.

Britain's National Crime Agency has hit on what looks like a simple way to stop impressionable teens from being sucked into cybercrime - advertise the terrible legal consequences using Google Ads. It sounds too good to be true - can a simple ad deter teen would-be hackers that easily? In fact, the evidence of similar campaigns run by the NCA in the past is that it has some effect.

Israeli cybersecurity researchers have disclosed details about a new flaw impacting DNS protocol that can be exploited to launch amplified, large-scale distributed denial-of-service attacks to takedown targeted websites. Called NXNSAttack, the flaw hinges on the DNS delegation mechanism to force DNS resolvers to generate more DNS queries to authoritative servers of attacker's choice, potentially causing a botnet-scale disruption to online services.

Israeli cybersecurity researchers have disclosed details about a new flaw impacting DNS protocol that can be exploited to launch amplified, large-scale distributed denial-of-service attacks to takedown targeted websites. Called NXNSAttack, the flaw hinges on the DNS delegation mechanism to force DNS resolvers to generate more DNS queries to authoritative servers of attacker's choice, potentially causing a botnet-scale disruption to online services.