In response to today’s Kaspersky Labs’ research summary “No Room for Cyber-Complacency: a Quarter of DDoS Attacks Claim Unintended Victims”, a cybersecurity expert with Corero Network Security, leaders in real-time, high-performance DDoS defense solutions commented below.
Earlier this week GCHQ’s National Cyber Security Centre (NCSC) has warned that some areas of the British electoral system could still be vulnerable to cyber operations, ahead of local elections scheduled for May 3, 2018.
Security researchers have discovered malware that could be assembling a botnet army composed of five million compromised Android devices. Researchers from cybersecurity firm Check Point said that the RottenSys malware was targeted at Android users through an app disguised as a WiFi service.
Reports of DDoS attacks on the Russian, or any other government, elections come as no surprise. There’s no better time to make your point, whether it’s political, moral or otherwise, whichever side of the political fence you sit.
It has been reported that the Russian Central Election Commission’s website was hit by a DDoS attack from IP addresses from 15 countries on the election day. If you’re planning to write on this please see below for some thoughts from security experts.
DDoS attacks taking advantage of ill-advised use of memcached have begun to decline, either because sysadmins are securing the process, or because people are using a potentially-troublesome “kill switch”.
Network security firm Corero revealed that it discovered a “kill-switch” that can suppress memcached attacks in seconds. The company also revealed that memcached attacks can not only disrupt services, but also steal server data.
Corero Network Security has disclosed the existence of a practical ‘kill switch’ countermeasure for the Memcached vulnerability, responsible for some of the largest DDoS attacks ever recorded. At the same time, the company has warned that the vulnerability is more extensive than originally reported – and can also be used by attackers to steal or modify data from the vulnerable Memcached servers.
While two PoC exploits for memcached DDoS attacks have been released online, experts at security firm Corero Network announced they have discovered a ‘kill switch’ to address the memcached vulnerability.
By now the vulnerability in Memcached Servers has been exposed to the masses since its proof of concept (PoC) code was recently published online. That exposure would now allow script kiddies to conduct large-scale DDoS attack as if the recent massive DDoS attack on Github and the world’s largest 1.7Tbps attack on an American firm weren’t enough.
Researchers claim to have discovered a way of mitigating a vulnerability in Memcached servers which is responsible for two of the biggest DDoS attacks ever recorded. Corero Network Security said it has disclosed the new “kill switch” to the authorities in a bid to lock down the flaw worldwide and prevent more damaging attacks.
Recently we informed our readers about how attackers are abusing the misconfigured Memcached servers to launch massive DDoS attacks. According to the observation of not one or two but three security firms, massive Memcached reflection distributed denial of service (DDoS) attacks are being launched with an unprecedented intensification factor of 50,000, which is the largest in DDoS attacks’ history.