New cyber security attacks and DDoS threats are lurking in the shadows everyday. Read the latest information and stay head of these vulnerabilities with updated DDoS reports and cyber security threat reports from Radware's Emergency Response Team (ERT).
To receive an email notification when ERT threat alerts are posted, click here.
Hacktivists have increased their activities in recent months, expressing social and political agendas via cyber-protests. These uproars have now taken to the digital world where hacktivists are using defacements, injections and denial-of-service attacks. In addition to just spreading their message, organized groups also engage in influential operations as an attempt to not only control the political message, but the leadership itself.
OpIsrael is a yearly campaign created by Anonymous in 2012 with the stated goal of “erasing Israel from the internet” in protest against the Israeli government’s conduct in the Israli-Palestinian conflict. Ideology, politics and religious differences are at the core of this operation.
Last week Drupal announced a critical vulnerability affecting Drupal version 7 and 8. Drupal is an open source content management software (CMS) written in PHP with almost a million users worldwide.
A newly discovered botnet targets TCP port 8291 and vulnerable Mikrotik RouterOS-based devices. MikroTik, a Latvian hardware manufacturer, products are used around the world and are now a target of a new propagating botnet exploiting vulnerabilities in their RouterOS operating system, allowing attackers to remotely execute code on the device. Such devices have been making unaccounted outbound winbox connections.
Putinstresser.eu is a recent DDoS-as-a-Service tool and is one of the newest additions to the growing array of low-priced services commonly known as ‘booter’ or ‘stresser’ services. The site illustrates the ease of access these services have reached. It provides different payment options, discovery tools, customer support and a variety of attack vectors for a wide range of customers.
The record-breaking denial-of-service attacks launched against GitHub and other organizations quickly caught the attention of both the security community and the public.
On February 27, 2018 several organizations began publicly disclosing a trend in UDP amplified attacks utilizing exposed Memcached servers. The Memcached protocol was never intended to be exposed to the Internet and thus did not have sufficient security controls. Because of this exposure, attackers are able to abuse Memcached UDP port 11211 for reflective, volumetric attacks.