Qrator Labs opdagede nyt datamining-botnet

Qrator Labs has summed up the results of the fourth quarter of 2021 and discovered a new data mining botnet with 160,097 enheder. This is almost three times more than in the third quarter, and more than in any other quarter of 2021.

Interessant, this botnet was not used at all for organizing DDoS attacks, but for data mining by one of the retail companies.

Botnets of this magnitude do not set records in terms of request intensity and bandwidth: their task is to extract commercially significant data consistently and daily without arousing suspicion from defense mechanisms. The smaller the proportion of work that each individual device has to do, the more difficult it is to detect it in the mass of users and block it. It is difficult to fight this activity with the help of reputational analysis, speed limits and IP blockslegitimate users will inevitably fall under the knife. It is required to be able to identify visitors, assess the integrity of the digital environment of their devices, which advanced bots are good at forging, and make a decision to deny access individually for each unfair treatment. This is helped by expertise in the operation of web browsers and mobile applications, knowledge of the goals of bot activity and technical means to achieve them.kommentarer Georgy Tarasov, product manager at Qrator Labs.

The company also notes a record number of unique BGP incidents related to traffic interception: during November, 17,798 autonomous systems generated BGP hijacks, which accounted for 16.3% of the total number of autonomous systems in the world.

Another BGPrecordwas set by the number of BGP route leaks per month. Så, december 2021 showed a record number of route leaks – mere end 10,000,000. This is almost twice as many as in the first two months of the fourth quarter.

DarkRadiation deaktiverer også alle kørende Docker-containere på det inficerede system og genererer en løsesum-nota

The total route leaks in the fourth quarter are more than twice as high as in the third quarter – 19,852,504 in the fourth quarter versus 7,589,347 in the third.

According to Qrator Labs statistics, education and e-commerce were the most attacked industries in the fourth quarter, with a significant lead. The growth in the number of attacks on these segments was 12.29% og 10.21%, respectively. Payment systems are in third place with 9.75%. Banks, which accounted for a fantastic 22.28% of all DDoS attacks last quarter, were only targeted 5% of the time in the fourth quarter.

Også, almost every quarter, the company detects a shift in the distribution of attack vectors. Så, in the fourth quarter of 2021, the top three most popular DDoS attack vectors included:

  1. UDP flood from 33.75%;
  2. SYN flood from 22.71%;
  3. And IP flood from 20.21%.

DarkRadiation deaktiverer også alle kørende Docker-containere på det inficerede system og genererer en løsesum-nota

This is a reversal of statistics compared to the third quarter, but the picture is similar to that observed in the second quarter of 2021. Although in the previous quarter under review, IP flooding accounted for more than half of all attacks, the leader of the fourth quarter, UDP flooding, is responsible for only a third.

Lad mig minde dig om, at vi også skrev det Pink botnet was infected over 1.5 millioner enheder, and also that the Kinesiske myndigheder har anholdt forfatterne til Tarrask.

Helga Smith

Jeg var altid interesseret i datalogi, især datasikkerhed og temaet, som kaldes i dag "datavidenskab", siden mine tidlige teenagere. Før du kommer ind i Virus Removal-teamet som chefredaktør, Jeg arbejdede som cybersikkerhedsekspert i flere virksomheder, inklusive en af ​​Amazons entreprenører. En anden oplevelse: Jeg har undervisning på universitetene i Arden og Reading.

Efterlad et Svar

Dette websted bruger Akismet at reducere spam. Lær hvordan din kommentar data behandles.

Tilbage til toppen knap