Mirai: Now with TOR

Botnets, a collection of Internet-connected devices compromised by malware and under the control of a botnet “herder”, pose a significant threat to the cybersecurity of both the owners of the devices and the rest of the Internet at large.

Mirai botnet MUD

photo credit: Obsydistone / Wikia

The security impacts of botnets for the Internet arise from the fact that they are designed to be used to amplify the botnet herder’s ability to perform large-scale cyberattacks. A common example of this is a Distributed Denial of Service (DDoS) attack, where many devices work together to overwhelm and take down an organization’s website. As botnets grow larger and easier to create, organizations increasingly need to deploy robust DDoS protection solutions to help protect their Internet presence.…

Continue reading

DDoS Damage: Why Ecommerce Sites Are So Vulnerable, And What Can Be Done

When it comes to the bad things in life there are degrees of awfulness. For instance, falling down a flight of stairs is bad. Falling down a flight of stairs in front of an important potential business partner who does not seem interested in signing on the dotted line just because someone is pitifully holding an ice pack to his or her face is worse. Life is fascinating like that.

DDoS attacks

With DDoS attacks, there are a number of factors that contribute to an attack’s awfulness – size, duration, attack type – but one of the big ones actually has little to do with the attack itself and everything to do with the target.…

Continue reading

How to Mitigate Unpredictable DDoS Attacks and Protect Your Digital Business Assets

Over the last year, distributed denial-of-service DDoS attacks have gotten stronger and evolved in strategy and tactics as cyber-criminals get smarter. With increased reports of “smoke screening”, where attackers use DDoS attacks to distract IT staff while inserting malware to breach confidential data such as bank account credentials and client data. Over 50% of attacked companies reported theft of funds, data or intellectual property. These types of attacks are more powerful but short-lived and more precise than prolonged strikes whose goal is extended downtime.

Protecting your digital assets from DDoS attacks

DDoS attacks vary in both sophistication and intensity. Attackers typically make fake requests that look like random garbage on the network, or more troublesome; make the attack traffic look exactly like real web traffic.…

Continue reading