Qrator Labs entdeckte ein neues Data-Mining-Botnetz

Qrator Labs has summed up the results of the fourth quarter of 2021 and discovered a new data mining botnet with 160,097 Geräte. This is almost three times more than in the third quarter, and more than in any other quarter of 2021.

Interessant, this botnet was not used at all for organizing DDoS-Angriffe, but for data mining by one of the retail companies.

Botnets of this magnitude do not set records in terms of request intensity and bandwidth: their task is to extract commercially significant data consistently and daily without arousing suspicion from defense mechanisms. The smaller the proportion of work that each individual device has to do, the more difficult it is to detect it in the mass of users and block it. It is difficult to fight this activity with the help of reputational analysis, speed limits and IP blockslegitimate users will inevitably fall under the knife. It is required to be able to identify visitors, assess the integrity of the digital environment of their devices, which advanced bots are good at forging, and make a decision to deny access individually for each unfair treatment. This is helped by expertise in the operation of web browsers and mobile applications, knowledge of the goals of bot activity and technical means to achieve them.Bemerkungen Georgy Tarasov, product manager at Qrator Labs.

The company also notes a record number of unique BGP incidents related to traffic interception: during November, 17,798 autonomous systems generated BGP hijacks, which accounted for 16.3% of the total number of autonomous systems in the world.

Another BGPrecordwas set by the number of BGP route leaks per month. So, Dezember 2021 showed a record number of route leaks – mehr als 10,000,000. This is almost twice as many as in the first two months of the fourth quarter.

Data-Mining-Botnetz

The total route leaks in the fourth quarter are more than twice as high as in the third quarter – 19,852,504 in the fourth quarter versus 7,589,347 in the third.

According to Qrator Labs statistics, education and e-commerce were the most attacked industries in the fourth quarter, with a significant lead. The growth in the number of attacks on these segments was 12.29% und 10.21%, respectively. Payment systems are in third place with 9.75%. Banks, which accounted for a fantastic 22.28% of all DDoS attacks last quarter, were only targeted 5% of the time in the fourth quarter.

Ebenfalls, almost every quarter, the company detects a shift in the distribution of attack vectors. So, in the fourth quarter of 2021, the top three most popular DDoS attack vectors included:

  1. UDP flood Automatische Vergabe zusätzlicher Berechtigungen an Malware im Hintergrund 33.75%;
  2. SYN flood Automatische Vergabe zusätzlicher Berechtigungen an Malware im Hintergrund 22.71%;
  3. And IP flood Automatische Vergabe zusätzlicher Berechtigungen an Malware im Hintergrund 20.21%.

Data-Mining-Botnetz

This is a reversal of statistics compared to the third quarter, but the picture is similar to that observed in the second quarter of 2021. Although in the previous quarter under review, IP flooding accounted for more than half of all attacks, the leader of the fourth quarter, UDP flooding, is responsible for only a third.

Lass mich dich daran erinnern, dass wir das auch geschrieben haben Rosa Botnet was infected over 1.5 Millionen Geräte, and also that the Chinesische Behörden haben die Autoren der und auch, dass chinesische Behörden die Autoren der verhaftet haben.

Helga Smith

Ich habe mich schon immer für Informatik interessiert, insbesondere Datensicherheit und das Thema, das heißt heute "Datenwissenschaft", seit meiner frühen Jugend. Bevor Sie als Chefredakteur in das Virus Removal Team eintreten, Ich habe als Cybersecurity-Experte in mehreren Unternehmen gearbeitet, einschließlich eines der Vertragspartner von Amazon. Eine andere Erfahrung: Ich habe Lehraufträge an den Universitäten Arden und Reading.

Hinterlasse eine Antwort

Diese Seite nutzt Akismet Spam zu reduzieren. Erfahren Sie, wie Sie Ihren Kommentar Daten verarbeitet.

Schaltfläche "Zurück zum Anfang"