Home » Liberty » The Next Cyber Hurricane Is Coming And It’ll Take Down The Internet

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

The Next Cyber Hurricane Is Coming And It’ll Take Down The Internet

The Next Cyber Hurricane Is Coming And It’ll Take Down The Internet

botnet mit bot herder 3D

Last year, the botnet Mirai caused a massive distributed denial-of-service (DDoS) attack in October, knocking popular websites off the internet for millions of users. Right now, the next cyber hurricane is on the way, and it could take down the entire internet.

According to ZD Net, the botnet, dubbed “Reaper” by researchers at Netlab 360, is appearing on the radar of security researchers.  A little over a month ago, the researchers detected the sizable botnet of infected Internet of Things (IoT) devices. Now, just weeks later, it’s on track to become one of the largest botnets recorded in recent years.

The botnet is said to have ensnared almost two million Internet-connected webcams, security cameras, and digital video recorders (DVRs) in the past month, says Check Point, which also published research, putting its growth at a far faster pace than Mirai.

Mirai was “beautifully simple,” said Ken Munro, a consultant at UK-based security firm Pen Test Partners. The malware would scan the internet and infect connected devices with default usernames and passwords, which either weren’t or couldn’t be changed by the owner. The collective bandwidth from the huge number of “zombie devices” that were infected and enslaved was directed at Dyn, an internet infrastructure company, which overloaded the company’s systems and prevented millions from accessing popular websites.

Reaper, on the other hand, is much more complex. It’s “what Mirai could easily have been,” said Munro. It takes a slightly different, more advanced approach by quietly targeting and exploiting known vulnerabilities in devices and injecting its malicious code. This effectively hijacks the device for whenever the botnet controller is ready to issue their commands. Each time a device is infected, the device spreads the malware to other vulnerable devices just like a worm.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress