Qrator Labs 發現新的數據挖掘殭屍網絡

Qrator Labs has summed up the results of the fourth quarter of 2021 and discovered a new data mining botnet with 160,097 設備. This is almost three times more than in the third quarter, and more than in any other quarter of 2021.

有趣的是, this botnet was not used at all for organizing DDoS 攻擊, but for data mining by one of the retail companies.

Botnets of this magnitude do not set records in terms of request intensity and bandwidth: their task is to extract commercially significant data consistently and daily without arousing suspicion from defense mechanisms. The smaller the proportion of work that each individual device has to do, the more difficult it is to detect it in the mass of users and block it. It is difficult to fight this activity with the help of reputational analysis, speed limits and IP blockslegitimate users will inevitably fall under the knife. It is required to be able to identify visitors, assess the integrity of the digital environment of their devices, which advanced bots are good at forging, and make a decision to deny access individually for each unfair treatment. This is helped by expertise in the operation of web browsers and mobile applications, knowledge of the goals of bot activity and technical means to achieve them.評論 Georgy Tarasov, product manager at Qrator Labs.

The company also notes a record number of unique BGP incidents related to traffic interception: during November, 17,798 autonomous systems generated BGP hijacks, which accounted for 16.3% of the total number of autonomous systems in the world.

Another BGPrecordwas set by the number of BGP route leaks per month. 所以, 十二月 2021 showed a record number of route leaks – 多於 10,000,000. This is almost twice as many as in the first two months of the fourth quarter.

數據挖掘殭屍網絡

The total route leaks in the fourth quarter are more than twice as high as in the third quarter – 19,852,504 in the fourth quarter versus 7,589,347 in the third.

According to Qrator Labs statistics, education and e-commerce were the most attacked industries in the fourth quarter, with a significant lead. The growth in the number of attacks on these segments was 12.29% 和 10.21%, respectively. Payment systems are in third place with 9.75%. Banks, which accounted for a fantastic 22.28% of all DDoS attacks last quarter, were only targeted 5% of the time in the fourth quarter.

也, almost every quarter, the company detects a shift in the distribution of attack vectors. 所以, in the fourth quarter of 2021, the top three most popular DDoS attack vectors included:

  1. UDP flood from 33.75%;
  2. SYN flood from 22.71%;
  3. And IP flood from 20.21%.

數據挖掘殭屍網絡

This is a reversal of statistics compared to the third quarter, but the picture is similar to that observed in the second quarter of 2021. Although in the previous quarter under review, IP flooding accounted for more than half of all attacks, the leader of the fourth quarter, UDP flooding, is responsible for only a third.

讓我提醒你,我們也寫過 粉紅殭屍網絡 was infected over 1.5 百萬台設備, and also that the 中國當局逮捕了該案的作者 並且中國當局逮捕了這本書的作者.

赫爾加·史密斯

我一直對計算機科學感興趣, 特別是數據安全和主題, 現在被稱為 "數據科學", 從我十幾歲起. 在加入病毒清除團隊擔任主編之前, 我曾在多家公司擔任網絡安全專家, 包括亞馬遜的一名承包商. 另一種體驗: 我在雅頓大學和雷丁大學任教.

發表評論

本網站使用的Akismet,以減少垃圾郵件. 了解您的意見如何處理數據.

返回頂部按鈕