Friday, November 1, 2024
HomeCloudTelegram MTProxy Used to Launch DDoS Attack Against Cloud Service Provider Arvan...

Telegram MTProxy Used to Launch DDoS Attack Against Cloud Service Provider Arvan – Peaks Up to 5,000 Requests Per Second

Published on

Malware protection

An Iranian based Cloud Infrastructure provider Arvan experienced a DDoS attack that peaks up to 5,000 Requests Per Second via Telegram MTProxy. The attack started on November 6 and lasts for 3 days.

The MTProxy was used by Telegram to bypass the Iranian filtering system as the Telegram banned in Iran. Several users started using MTProxy which makes difficult for the government authorities to restrict the traffic.

Attack With Telegram MTProxy

Arvan spotted huge traffic received using free MTProxy hit on their Edge server and the packets are not specific to any domain name and they are directly sent to the IP address.

- Advertisement - SIEM as a Service

The traffic received is completely random and has no similarities and it’s completely a new attack type and the traffic doesn’t follow any protocol patterns such as HTTP, HTTPS, FTP, and so on.

All the attack packets come within the Iranian IP and this huge amount of packets can disturb any server infrastructure the company says.

Arvan tried multiple ways to combat the attacks, but it fails, On Saturday the team detected that traffic was over telegram MTProxy service.

As the traffic is encrypted they behave like random traffic, widespread of the MTProxy service leads to the high volume of the distribution attack.

“Sending and using free MTProxy services on telegram channels is common and easy. It is easy to generate similar traffic by changing the IP address of one of these servers to the Arvan cloud address.”

Arvan stimulated the traffic via MTProxy service and the traffic is similar to the traffic received through DDoS attack.

By guessing the private key they able to decode the entire message, by checking with MTProxy service provider’s telegram channels they resolved to supercar and firewall gateway.

 “Lack of a multifaceted approach to modern technologies has resulted in the removal of a messenger with millions of audiences, which has faced various threats at various times.” Avancloud said via blog post.

The proliferation of unauthorized copies of the telegram accusing Iranian users of personal devices was one of them, and now they use of free MTProxy, and its promotion poses another major threat to Iranian users.

We have recently reported, The secure messaging app Telegram hit by a powerful DDoS attack and the users in the united states and other countries may experience connection issues with Telegram.

These signs indicate that the hackers continuously abusing the Telegram channel and using it for various attacks.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hardcoded Creds in Popular Apps Put Millions of Android and iOS Users at Risk

Recent analysis has revealed a concerning trend in mobile app security: Many popular apps...

Russia-Linked Hackers Attacking Governmental And Political Organizations

Two pro-Russian threat actors launched a distributed denial-of-service (DDoS) attack campaign against Japanese organizations...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system...