BrickerBot only attacks compromised devices

BrickerBot uses a network of globally distributed devices that are passively detecting exploit attempts from devices infected with IoT bots such as Mirai and Hajime. BrickerBot reacts to an exploit attempt by scanning the source of the exploit for a set number of ports, trying to secure the device (assumption based on Janit0r statements) and […]

The post BrickerBot only attacks compromised devices appeared first on Radware Blog.

Continue reading BrickerBot only attacks compromised devices

Hajime – Sophisticated, Flexible, Thoughtfully Designed and Future-Proof

A glimpse into the future of IoT Botnets On Oct 16th, Sam Edwards and Ioannis Profetis from Rapidity Networks published a report on a new malware they discovered and named “Hajime.” The report came in the aftermath of the release of the Mirai source code and Mirai’s attacks on Krebs and OVH. Before Hajime was […]

The post Hajime – Sophisticated, Flexible, Thoughtfully Designed and Future-Proof appeared first on Radware Blog.

Continue reading Hajime – Sophisticated, Flexible, Thoughtfully Designed and Future-Proof

Hajime – Sophisticated, Flexible, Thoughtfully Designed and Future-Proof

A glimpse into the future of IoT Botnets On Oct 16th, Sam Edwards and Ioannis Profetis from Rapidity Networks published a report on a new malware they discovered and named “Hajime.” The report came in the aftermath of the release of the Mirai source code and Mirai’s attacks on Krebs and OVH. Before Hajime was […]

The post Hajime – Sophisticated, Flexible, Thoughtfully Designed and Future-Proof appeared first on Radware Blog.

Continue reading Hajime – Sophisticated, Flexible, Thoughtfully Designed and Future-Proof

BrickerBot.3: The Janit0r is back, with a vengeance

In early April, we identified a new botnet designed to comprise IoT devices and corrupt their storage. Over a four-day period, our honeypots recorded 1,895 PDoS attempts performed from several locations around the world. Its sole purpose was to compromise IoT devices and corrupt their storage. Besides this intense, short-lived bot (BrickerBot.1), our honeypots recorded […]

The post BrickerBot.3: The Janit0r is back, with a vengeance appeared first on Radware Blog.

Continue reading BrickerBot.3: The Janit0r is back, with a vengeance

BrickerBot – The Dark Knight of IoT

Over the course of the last week, you have probably heard about the attacks designed to render Internet of Things (IoT) devices across the internet useless. We called the originator of the attacks “Brickerbot,” but should we have called it the “Batman of IoT”? Permanent Denial of Service PDoS is an attack that damages a […]

The post BrickerBot – The Dark Knight of IoT appeared first on Radware Blog.

Continue reading BrickerBot – The Dark Knight of IoT

BrickerBot – The Dark Knight of IoT

Over the course of the last week, you have probably heard about the attacks designed to render Internet of Things (IoT) devices across the internet useless. We called the originator of the attacks “Brickerbot,” but should we have called it the “Batman of IoT”? Permanent Denial of Service PDoS is an attack that damages a […]

The post BrickerBot – The Dark Knight of IoT appeared first on Radware Blog.

Continue reading BrickerBot – The Dark Knight of IoT

10 Cyber Security Questions with Radware’s Pascal Geenens

Radware’s Pascal Geenens walks us through 10 questions regarding the cyber security threat landscape, trends in the Darknet, motivations for attacks, and much more. What is the defining trend for the 2017 threat landscape? The Internet of Things (IoT). Everyone will remember the epic attacks against Krebs, OVH and Dyn last year. DDoS attacks with […]

The post 10 Cyber Security Questions with Radware’s Pascal Geenens appeared first on Radware Blog.

Continue reading 10 Cyber Security Questions with Radware’s Pascal Geenens

5 Recommendations for IoT Manufacturers

As devices get more connected, they potentially get smarter and provide richer functionality. The internet of things (IoT) describes a world where just about anything can be connected, from routers, smart thermostats, smart light bulbs, and door locks to intelligent fridges, or even cars. In recent events, devices with less than desirable security states were […]

The post 5 Recommendations for IoT Manufacturers appeared first on Radware Blog.

Continue reading 5 Recommendations for IoT Manufacturers

WAF and DDoS Help You on the Road to GDPR Compliancy

Data is the currency of today’s digital economy, the oil of the 21st century. Personal data is considered our economical asset generated by our identities and our behavior and we trade it for higher quality services and products. Online platforms act as intermediaries in a two-sided market collecting data from consumers and selling advertising slots […]

The post WAF and DDoS Help You on the Road to GDPR Compliancy appeared first on Radware Blog.

Continue reading WAF and DDoS Help You on the Road to GDPR Compliancy

The Shadow Brokers went dark, the NSA weakened and exposed in the cyber war

On January 12th, the Shadow Brokers announced they are ‘going dark’ by leaving a farewell: “So long, farewell peoples. TheShadowBrokers is going dark, making exit. Continuing is being much risk and b*******, not many bitcoins. … Despite theories, it always being about bitcoins for TheShadowBrokers. Free dumps and b******* political talk was being for marketing […]

The post The Shadow Brokers went dark, the NSA weakened and exposed in the cyber war appeared first on Radware Blog.

Continue reading The Shadow Brokers went dark, the NSA weakened and exposed in the cyber war