Rus Fronton Botnet, Büyük DDoS Saldırılarından Çok Daha Fazlasını Yapabilir

Son zamanlarda, Nisos published a new study describing the inner workings of the unusual Russian botnet Fronton.

şunu da yazdığımızı hatırlatalım The Appearance of Cheap Russian KaranlıkKristal RAT Kötü Amaçlı Yazılım Endişeli Uzmanlar.

ön yüz first emerged in 2020, when the hacktivist group Digital Revolution hacked into an FSB contractor and released white papers demonstrating the creation of a botnet on behalf of the FSB (Federal Security Service).

Media outlets went crazy. Headlines called it a tool that could be used to “turn off the Internet in a small country.” Most analyses assumed that the goal of the system was distributed denial of service (DDoS). A day later, another tranche of documents, images, and a video were released, with significantly less fanfare.researchers write.

Until recently, it was believed that the botnet was designed to carry out large-scale DDoS attacks. According to Fronton’s analysis of additional documents, DDoS attacks are only part of the botnet’s capabilities.

Buna göre Nisos, Fronton isa system for coordinated non-authentic behavior,” ve SANA’s custom software shows that the botnet’s true goal may be the rapid and automatic spread of disinformation and propaganda.

Bunu bilmek de ilginizi çekebilir Darknet sites of the REvil group are working again: Ruslar siber suçluları doğaya saldı mı??

SANA consists of many features, dahil olmak üzere:

  1. Haberler: tracks messages, trends and responses to them;
  2. Groups: manages bots;
  3. Behavior models: creates bots that impersonate social media users;
  4. Reaction models: reacts to messages and content;
  5. Dictionaries: stores phrases, words, quotes, reactions and comments for use in social networks;
  6. Albums: Stores sets of images for platform bot accounts.

SANA also allows the user to create social media accounts with generated email addresses and phone numbers, and distribute content online. Ek olarak, the user can set a schedule for posts and adjust the number of likes, yorumlar, and reactions that the bot should generate. The botnet operator can also specify how manyfriendsthe bot account should have.

The configurator also allows the operator to specify the minimum frequency of actions and the interval between them. Görünen o ki, a machine learning system is involved, which can be turned on or off depending on the behavior of the bot in the social network.araştırmacılar dedi.

Helga Smith

Bilgisayar bilimlerine her zaman ilgi duymuşumdur., özellikle veri güvenliği ve tema, günümüzde denilen "veri bilimi", ilk gençlik yıllarımdan beri. Baş Editör olarak Virüs Temizleme ekibine gelmeden önce, Birkaç şirkette siber güvenlik uzmanı olarak çalıştım, Amazon'un yüklenicilerinden biri dahil. Başka bir deneyim: Arden ve Reading üniversitelerinde öğretmenlik var.

Cevap bırakın

Bu site spam azaltmak için Akismet kullanır. Yorumunuz verileri işlenirken öğrenin.

Başa dön tuşu