Monday, November 25, 2024
HomeBotnetMirai Variant Launches 54 Hours DDoS Attack Generated 2.8 Billion Requests...

Mirai Variant Launches 54 Hours DDoS Attack Generated 2.8 Billion Requests in US college

Published on

Mirai Variant launched continues DDoS in unnamed college in U.S  and it performed  54 Hours continuously  and  researchers believe it is a new variant of Mirai, one that is “more adept at launching application layer assaults.”

Researchers informed the Traffic flow around “30,000 RPS and peaked at around 37,000 RPS” and it is on of the hight amount of bots performed attack around  “2.8 Billion Requests” in Mirai botnet History .

Researcher’s watched a pool of attacking devices typically connected with Mirai, for example, CCTV cameras, DVRs and switches.

- Advertisement - SIEM as a Service

Assault movement began from 9,793 IPs around the world, however 70% of the botnet activity originated from 10 nations,During the 54-hour DDoS attack on the college.

Researchers from Imperva Incapsula said ,

The DDoS bots used in the attack were hiding behind different user-agents than the five hardcoded in the default Mirai version. This–and the size of the attack itself–led us to believe that we might be dealing with a new variant, which was modified to launch more elaborate application layer attacks.

Attack Origin Nations

Image source :Imperva Incapsula

The U.S. topped the rundown by having 18.4 percent of the botnet IPs. Israel was next with 11.3 percent, trailed by Taiwan with 10.8 percent.

The staying seven nations of the main 10 were India with 8.7 percent, Turkey with 6 percent, Russia with 3.8 percent, Italy and Mexico both with 3.2 percent, Colombia with 3 percent and Bulgaria with 2.2 percent of the botnet activity.

Less than a day after the initial assault ended, another one began that lasted for an hour and a half with an average traffic flow of 15,000 RPS, Imperva Incapsula said .

Also Read:

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Water Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting Vulnerabilities

Water Barghest, a sophisticated botnet, exploits vulnerabilities in IoT devices to enlist them in...

Russia-Linked Hackers Attacking Governmental And Political Organizations

Two pro-Russian threat actors launched a distributed denial-of-service (DDoS) attack campaign against Japanese organizations...

ErrorFather Hackers Attacking & Control Android Device Remotely

The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to...