Hackers behind Mirai botnet & DYN DDoS attacks plead guilty

By Waqas
A group of three hackers has pleaded guilty to their role in
This is a post from HackRead.com Read the original post: Hackers behind Mirai botnet & DYN DDoS attacks plead guilty
Continue reading Hackers behind Mirai botnet & DYN DDoS attacks plead guilty

Three men plead guilty for roles in Mirai botnet empire, court documents show

Three men have pleaded guilty for their role in creating, operating and selling access to the “Mirai botnet,” a massive army of compromised internet-connected devices used last year to launch numerous distributed denial of service attacks against hosting companies, social media platforms and other online businesses. The defendants, Paras Jha, Josiah White and Dalton Norman, were each responsible for supporting an elaborate scheme that began with the creation of a scanning tool to find vulnerable devices connected to the internet, infect them with malware and then mobilize them into a cohesive botnet army capable of pushing excessive internet traffic onto a target in order to knock them offline. They guilty pleas were entered in a federal district court in Alaska, the Department of Justice said. Distributed denial of service attacks typically function through a centralized platform or operator who controls infected computers which can be used to flood digital properties with […]

The post Three men plead guilty for roles in Mirai botnet empire, court documents show appeared first on Cyberscoop.

Continue reading Three men plead guilty for roles in Mirai botnet empire, court documents show

Mirai IoT Botnet Co-Authors Plead Guilty

The U.S. Justice Department on Tuesday unsealed the guilty pleas of two men first identified in January 2017 by KrebsOnSecurity as the likely co-authors of Mirai, a malware strain that remotely enslaves so-called “Internet of Things” devices such as security cameras, routers, and digital video recorders for use in large scale attacks designed to knock Web sites and entire networks offline (including multiple major attacks against this site). Continue reading Mirai IoT Botnet Co-Authors Plead Guilty

IoT Botnet Satori Grows Rapidly Thanks to Zero-Day Flaw

An internet of things (IoT) botnet that recently hijacked more than 100,000 DSL modems in Argentina has extended to other countries and doubled in size over the past week, possibly due to a zero-day vulnerability. The botnet has been dubbed “Sato… Continue reading IoT Botnet Satori Grows Rapidly Thanks to Zero-Day Flaw

Cyber Security Roundup for November 2017

One of the most notable data breaches disclosed this month was by Uber, given the company attempted to cover up the breach by paying off hackers. Over a year ago the transport tech firm was said to have paid £75,000 to two hackers to delete 57 mil… Continue reading Cyber Security Roundup for November 2017

Public Remote Code Execution Exploit Affects Thousands of Email Servers

Developers of the widely used Exim message transfer agent are advising administrators to disable a feature on their email servers to protect them from a critical remote execution exploit that has been publicly disclosed. Developed at the University of … Continue reading Public Remote Code Execution Exploit Affects Thousands of Email Servers

Evolution is the Name of the Game

The following is a Q&A with Daniel Smith, an information security researcher for Radware’s Emergency Response Team. He focuses on security research and risk analysis for network and application based vulnerabilities. Daniel’s research focuses in on Denial-of-Service attacks and includes analysis of malware and botnets. As a white-hat hacker, his expertise in tools and techniques […]

The post Evolution is the Name of the Game appeared first on Radware Blog.

The post Evolution is the Name of the Game appeared first on Security Boulevard.

Continue reading Evolution is the Name of the Game

Fear the Reaper, or Reaper Madness?

Last week we looked at reports from China and Israel about a new “Internet of Things” malware strain called “Reaper” that researchers said infected more than a million organizations by targeting newfound security weaknesses in countless Internet routers, security cameras and digital video recorders (DVRs). Now some botnet experts are calling on people to stop the “Reaper Madness,” saying the actual number of IoT devices infected with Reaper right now is much smaller.

Arbor Networks said it believes the current actual size of the Reaper botnet fluctuates between 10,000 and 20,000 bots total. Arbor notes that this can change any time. Continue reading Fear the Reaper, or Reaper Madness?

Two lawmakers want to give consumers a way to know if their IoT devices are secure

The internet-connected devices that broke the internet in 2016 — what kid needs a Wi-Fi connected teddy bear? — sell like mad to consumers who have little idea if any security lies below the interfaces. One year after the Mirai botnet attacks brought some of the biggest tech companies to their knees, a new bill introduced on Friday aims to create a voluntary cybersecurity certification program to “independently identify, verify, and label compliant Internet-of-Things devices with strong cybersecurity standards.” The bill, known as the “Cyber Shield Act,” was introduced in the Senate by Sen. Edward Markey, D-Mass., and in the House of Representatives by Rep. Ted Lieu, D-Calif. The act would establish an advisory committee to evaluate devices like cameras, cellphones, laptops and baby monitors. Companies meeting the standards could display a label on their products that would better inform customers on security issues. “It is critical that we prioritize developing products with the security of […]

The post Two lawmakers want to give consumers a way to know if their IoT devices are secure appeared first on Cyberscoop.

Continue reading Two lawmakers want to give consumers a way to know if their IoT devices are secure