Qrator Labs discovered new data mining botnet

Qrator Labs has summed up the results of the fourth quarter of 2021 and discovered a new data mining botnet with 160,097 devices. This is almost three times more than in the third quarter, and more than in any other quarter of 2021.

Interestingly, this botnet was not used at all for organizing DDoS attacks, but for data mining by one of the retail companies.

Botnets of this magnitude do not set records in terms of request intensity and bandwidth: their task is to extract commercially significant data consistently and daily without arousing suspicion from defense mechanisms. The smaller the proportion of work that each individual device has to do, the more difficult it is to detect it in the mass of users and block it. It is difficult to fight this activity with the help of reputational analysis, speed limits and IP blockslegitimate users will inevitably fall under the knife. It is required to be able to identify visitors, assess the integrity of the digital environment of their devices, which advanced bots are good at forging, and make a decision to deny access individually for each unfair treatment. This is helped by expertise in the operation of web browsers and mobile applications, knowledge of the goals of bot activity and technical means to achieve them.bình luận Georgy Tarasov, product manager at Qrator Labs.

The company also notes a record number of unique BGP incidents related to traffic interception: during November, 17,798 autonomous systems generated BGP hijacks, which accounted for 16.3% of the total number of autonomous systems in the world.

Another BGPrecordwas set by the number of BGP route leaks per month. Vì thế, December 2021 showed a record number of route leaksmore than 10,000,000. This is almost twice as many as in the first two months of the fourth quarter.

Data mining botnet

The total route leaks in the fourth quarter are more than twice as high as in the third quarter – 19,852,504 in the fourth quarter versus 7,589,347 in the third.

According to Qrator Labs statistics, education and e-commerce were the most attacked industries in the fourth quarter, with a significant lead. The growth in the number of attacks on these segments was 12.29% Và 10.21%, respectively. Payment systems are in third place with 9.75%. Banks, which accounted for a fantastic 22.28% of all DDoS attacks last quarter, were only targeted 5% of the time in the fourth quarter.

Cũng, almost every quarter, the company detects a shift in the distribution of attack vectors. Vì thế, in the fourth quarter of 2021, the top three most popular DDoS attack vectors included:

  1. UDP flood from 33.75%;
  2. SYN flood from 22.71%;
  3. IP flood from 20.21%.

Data mining botnet

This is a reversal of statistics compared to the third quarter, but the picture is similar to that observed in the second quarter of 2021. Although in the previous quarter under review, IP flooding accounted for more than half of all attacks, the leader of the fourth quarter, UDP flooding, is responsible for only a third.

Hãy để tôi nhắc bạn rằng chúng tôi cũng đã viết rằng Pink botnet was infected over 1.5 triệu thiết bị, and also that the Chính quyền Trung Quốc đã bắt giữ các tác giả của cuốn sách Mạng botnet rạp chiếu phim.

Helga Smith

Tôi luôn quan tâm đến khoa học máy tính, đặc biệt là bảo mật dữ liệu và chủ đề, được gọi là ngày nay "khoa học dữ liệu", kể từ khi tôi còn ở tuổi thiếu niên. Trước khi vào nhóm Diệt Virus với vai trò Tổng biên tập, Tôi đã làm việc với tư cách là chuyên gia an ninh mạng tại một số công ty, bao gồm một trong những nhà thầu của Amazon. Một trải nghiệm khác: Tôi đã nhận được đang giảng dạy tại các trường đại học Arden và Reading.

Gửi phản hồi

Website này sử dụng Akismet để hạn chế spam. Tìm hiểu bình luận của bạn được duyệt như thế nào.

Nút quay lại đầu trang