Automatisk fjerningsguide for Reqg

Qrator Labs has summed up the results of the fourth quarter of 2021 and discovered a new data mining botnet with 160,097 enheter. This is almost three times more than in the third quarter, and more than in any other quarter of 2021.

Interessant, this botnet was not used at all for organizing DDoS attacks, but for data mining by one of the retail companies.

Botnets of this magnitude do not set records in terms of request intensity and bandwidth: their task is to extract commercially significant data consistently and daily without arousing suspicion from defense mechanisms. The smaller the proportion of work that each individual device has to do, the more difficult it is to detect it in the mass of users and block it. It is difficult to fight this activity with the help of reputational analysis, speed limits and IP blockslegitimate users will inevitably fall under the knife. It is required to be able to identify visitors, assess the integrity of the digital environment of their devices, which advanced bots are good at forging, and make a decision to deny access individually for each unfair treatment. This is helped by expertise in the operation of web browsers and mobile applications, knowledge of the goals of bot activity and technical means to achieve them.kommentarer Georgy Tarasov, product manager at Qrator Labs.

The company also notes a record number of unique BGP incidents related to traffic interception: during November, 17,798 autonomous systems generated BGP hijacks, which accounted for 16.3% of the total number of autonomous systems in the world.

Another BGPrecordwas set by the number of BGP route leaks per month. Så, desember 2021 showed a record number of route leaks – mer enn 10,000,000. This is almost twice as many as in the first two months of the fourth quarter.

innholdet i et slikt vindu lastes ned fra en ekstern server og plasseres i en WebView som imiterer utseendet til målprogrammet for å lure offeret

The total route leaks in the fourth quarter are more than twice as high as in the third quarter – 19,852,504 in the fourth quarter versus 7,589,347 in the third.

According to Qrator Labs statistics, education and e-commerce were the most attacked industries in the fourth quarter, with a significant lead. The growth in the number of attacks on these segments was 12.29% og 10.21%, respectively. Payment systems are in third place with 9.75%. Banks, which accounted for a fantastic 22.28% of all DDoS attacks last quarter, were only targeted 5% of the time in the fourth quarter.

Også, almost every quarter, the company detects a shift in the distribution of attack vectors. Så, in the fourth quarter of 2021, the top three most popular DDoS attack vectors included:

  1. UDP flood from 33.75%;
  2. SYN flood from 22.71%;
  3. And IP flood from 20.21%.

innholdet i et slikt vindu lastes ned fra en ekstern server og plasseres i en WebView som imiterer utseendet til målprogrammet for å lure offeret

This is a reversal of statistics compared to the third quarter, but the picture is similar to that observed in the second quarter of 2021. Although in the previous quarter under review, IP flooding accounted for more than half of all attacks, the leader of the fourth quarter, UDP flooding, is responsible for only a third.

La meg minne deg på at vi også skrev det Rosa botnett was infected over 1.5 millioner enheter, and also that the Kinesiske myndigheter har arrestert forfatterne av oppretter skjulte planlagte oppgaver og nye nøkler for dem.

Helga Smith

Jeg var alltid interessert i datavitenskap, spesielt datasikkerhet og temaet, som kalles i våre dager "datavitenskap", siden min tidlige tenåring. Før du kommer inn i Virusfjerningsteamet som sjefredaktør, Jeg jobbet som cybersikkerhetsekspert i flere selskaper, inkludert en av Amazons entreprenører. Nok en opplevelse: Jeg har undervisning på universitetene i Arden og Reading.

Legg igjen et svar

Denne siden bruker Akismet å redusere spam. Lær hvordan din kommentar data behandles.

Tilbake til toppen