Launching a DDoS is Piece of Cake

If it was believed that only professional hackers can launch a Distributed Denial of Service (DDoS) Attack, think twice! Hackers have recently released the source code of the malware that enabled them to create a massive network of botnets and launch the crippling DDoS attack on cyber security analyst, Brian Krebs’s website.

The malware named “Mirai” and posted on HackForum by one “Anna-senpai” is developed to infect IoT devices and made use of their factory default username and passwords. And once the devices are infected, they can be controlled by a central server to launch the DDoS attack.

And in another connected news story, allegedly Russian hackers have launched a DDoS assault on Newsweek after it posted a scathing article against Donald Trump, the US Presidential candidate.

So now, we have some kind of mixed brew here with politics and technology mixed up. The problem is tracking the original attacker is almost impossible and though certain agencies have been pointing the finger at Russia, it could be just about anyone. And now the question of publishing the source code of “Mirai”. Why hackers do this considering there is great deal of  money to be made selling them in the dark web!

One viable reason would be that after launching a majorly successful attack, the one thing the attackers do is cover their tracks. And by posting the source code online, with the malware code proliferating across the web, it would make it almost impossible to track down the original attacker.

The Whack for this was invented sometime back. Called IPv6 addressing that would put a unique IP Address to every IoT device.  But question to beg here is why it has not been implemented! But with Botnets even that is defeated. And for the rest of us, it would be good if we changed the default username and password for our Internet connected devices.


About The Author

"Founded in July, 2016, is a cyber security blog that covers important security issues affecting common users, industry and governments. It aims to create awareness among its readers about malware, hacking, encryption, identity theft, privacy, etc and also offer solutions to protect themselves from such attacks"

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

1 + ten =