New cyber security attacks and DDoS threats are lurking in the shadows everyday. Read the latest information and stay head of these vulnerabilities with updated DDoS reports and cyber security threat reports from Radware's Emergency Response Team (ERT).
To receive an email notification when ERT threat alerts are posted, click here.
Putinstresser.eu is a recent DDoS-as-a-Service tool and is one of the newest additions to the growing array of low-priced services commonly known as ‘booter’ or ‘stresser’ services. The site illustrates the ease of access these services have reached. It provides different payment options, discovery tools, customer support and a variety of attack vectors for a wide range of customers.
The record-breaking denial-of-service attacks launched against GitHub and other organizations quickly caught the attention of both the security community and the public.
On February 27, 2018 several organizations began publicly disclosing a trend in UDP amplified attacks utilizing exposed Memcached servers. The Memcached protocol was never intended to be exposed to the Internet and thus did not have sufficient security controls. Because of this exposure, attackers are able to abuse Memcached UDP port 11211 for reflective, volumetric attacks.
On February 5, 2018, an independent researcher disclosed a zero-day WordPress DoS vulnerability that allows application-level denial of service (AppDoS) attacks against websites using the WordPress platform. WordPress is an open source content management system (CMS) written in PHP and powers over 29% of the Internet’s sites and blogs.
Radware’s Threat Research has recently discovered a new botnet, dubbed DarkSky. DarkSky botnet features several evasion mechanisms, a malware downloader and a variety of network- and application-layer DDoS attack vectors. This bot is now available for sale for less than $20 over the Darknet.
Radware’s Emergency Response Team has been monitoring the emergence of a new botnet this week. The ADB.miner malware takes advantage of Android-based devices that expose debug capabilities to the Internet.
A new botnet, dubbed JenX, has begun recruiting IoT devices. The botnet is being marketed over the Internet and offers up to 300Gbps attacks for as little as $20. It uses hosted servers to find and infect IoT devices leveraging one of two known vulnerabilities that have become popular in IoT botnets recently.