Articles tagged "DDoS"

Found 41 articles

Researchers from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42 have identified that attackers are exploiting a command injection vulnerability, CVE-2024-3721, in TBK DVRs and outdated TP-Link Wi-Fi routers. This medium-severity flaw, which has a CVSS score of 6.3, allows malicious actors to hijack these devices to create a botnet for DDoS attacks. The compromised TBK DVRs and EoL TP-Link routers are particularly concerning as they can be easily targeted due to their lack of ongoing support and security updates. This situation poses a significant risk to users, as their devices can be turned into tools for larger-scale cyberattacks without their knowledge. Users of these devices should take immediate action to secure their systems against potential exploitation.

Impact: TBK DVRs and end-of-life TP-Link Wi-Fi routers
Remediation: Users should update their devices to the latest firmware if available, or replace unsupported devices. Additionally, changing default credentials and disabling remote access can help mitigate risks.
Read Original

Operation PowerOFF has successfully disrupted several 'booter' services that allow users to pay for launching distributed denial-of-service (DDoS) attacks. These services have been a growing concern as they enable individuals to easily target websites and online services, causing disruptions and potential financial losses. Law enforcement agencies coordinated efforts to take down these operations, leading to multiple arrests. This crackdown is significant as it aims to reduce the accessibility of DDoS attack tools, which can affect various online services and users. The operation highlights the ongoing battle against cybercrime and the need for continued vigilance in cybersecurity.

Impact: DDoS-for-hire services, online gaming platforms, websites of various businesses
Remediation: N/A
Read Original

In a significant crackdown on online crime, international law enforcement agencies, including the FBI and Europol, launched ‘Operation PowerOff’ to disrupt DDoS-for-hire services. This operation involved seizing critical infrastructure used by these services and making several arrests. Additionally, authorities sent warning letters to individuals known to have used these DDoS services, signaling a strong stance against such illicit activities. DDoS attacks, which overwhelm websites and networks to render them unusable, have been a growing concern for businesses and organizations worldwide. By targeting these services, law enforcement aims to reduce the frequency of these attacks and deter potential users from engaging with them.

Impact: DDoS-for-hire services, online crime infrastructure
Remediation: N/A
Read Original

Law enforcement agencies from 21 countries have successfully dismantled 53 domains linked to DDoS-for-hire services. This coordinated action aimed to disrupt operations that allow individuals or groups to launch distributed denial-of-service attacks on targeted websites, effectively overwhelming them with traffic. DDoS attacks can cripple businesses, disrupt services, and lead to significant financial losses. By targeting these domains, authorities are sending a strong message against cybercriminal activities and attempting to reduce the availability of these illicit services. This operation reflects a growing international effort to combat online crime and protect organizations from such disruptive attacks.

Impact: DDoS-for-hire services
Remediation: N/A
Read Original

Operation PowerOFF is an international law enforcement initiative that has successfully dismantled 53 domains linked to commercial distributed denial-of-service (DDoS) services. This operation led to the arrest of four individuals and exposed over 3 million accounts belonging to cybercriminals. These DDoS-for-hire services were reportedly utilized by more than 75,000 users, highlighting the scale of the issue. By disrupting access to these services and taking down their supporting infrastructure, authorities aim to reduce the prevalence of DDoS attacks, which can severely impact businesses and online services. The operation is part of a broader effort to combat cybercrime and enhance online security.

Impact: DDoS-for-hire services, cybercriminal accounts
Remediation: N/A
Read Original

On April 13, 2026, law enforcement agencies conducted 'Operation PowerOFF,' which successfully identified 75,000 users involved in distributed denial-of-service (DDoS) attacks across 21 countries. The operation led to the takedown of 53 domains associated with these attacks. By targeting the DDoS ecosystem, authorities aim to disrupt the infrastructure that enables these types of cyberattacks, which can overwhelm websites and online services, causing significant downtime and financial losses. This operation is a crucial step in combating the growing threat of DDoS attacks, which have become increasingly sophisticated and harmful to businesses and individuals alike. The large number of identified users highlights the scale of the issue and underscores the need for ongoing vigilance in cybersecurity efforts.

Impact: DDoS attack services, related online platforms, 53 identified domains
Remediation: N/A
Read Original

In a recent operation dubbed PowerOFF, authorities seized 53 domains linked to DDoS-for-hire services, aiming to disrupt the activities of over 75,000 suspected cybercriminals. These services allow individuals to pay for attacks that overwhelm targeted websites and networks with excessive traffic, causing disruptions and downtime. The crackdown is part of a broader effort to combat cybercrime and reduce the prevalence of these harmful services. Officials have issued warnings to the involved individuals, urging them to cease their activities. This operation highlights ongoing concerns about the accessibility of DDoS attacks and the need for stronger measures to protect online infrastructure.

Impact: DDoS-for-hire services, targeted websites, and networks
Remediation: N/A
Read Original

A report from Qrator Labs has revealed a significant increase in a DDoS botnet, which has now ballooned to 13.5 million compromised devices over the past year. The majority of these devices are located in the United States, Brazil, and India. This surge in botnet size has enabled attackers to launch unprecedented distributed denial-of-service attacks, reaching up to 2 terabits per second. The fintech and betting industries appear to be the primary targets of these assaults. This situation raises alarms for businesses in these sectors, as the sheer scale of attacks could disrupt services and lead to substantial financial losses.

Impact: Fintech and betting industries
Remediation: Companies should enhance their DDoS mitigation strategies, implement traffic filtering, and consider using cloud-based DDoS protection services.
Read Original
13.5M Device Botnet Drives 2 Tbps DDoS Attacks on FinTech, Qrator Finds

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent report from Qrator Labs indicates that the largest known DDoS botnet has expanded to encompass 13.5 million devices. This massive botnet is capable of launching Distributed Denial of Service (DDoS) attacks reaching up to 2 terabits per second. The primary target of these attacks has been the financial technology sector, raising concerns for companies in that space. With such a vast number of devices potentially under the control of attackers, the threat to both service availability and data security is significant. Companies in the FinTech sector, as well as other industries relying on online services, need to bolster their defenses to mitigate the risks associated with these powerful DDoS attacks.

Impact: FinTech companies and online services reliant on uninterrupted access.
Remediation: Companies should implement advanced DDoS protection measures and traffic filtering solutions.
Read Original
Alleged German DDoS-for-Hire Kingpin Behind Fluxstress Caught in Thailand

Hackread – Cybersecurity News, Data Breaches, AI and More

A German national, suspected of being a key figure in the DDoS-for-hire scene, was arrested in Thailand. This individual is believed to be the mastermind behind services like Fluxstress and Neldowner, which have been used to launch distributed denial-of-service (DDoS) attacks globally. His arrest marks a significant step in combating online cybercrime, particularly as DDoS attacks continue to disrupt businesses and services across various sectors. The operation he led allowed users to pay for attacks that could overwhelm targets, causing significant downtime and financial losses. His capture may deter others from engaging in similar illegal activities and could lead to further investigations into the networks supporting these services.

Impact: N/A
Remediation: N/A
Read Original

The Masjesu botnet, also referred to as XorBot, has emerged as a stealthy DDoS-for-hire service that primarily targets Internet of Things (IoT) devices. Unlike many other botnets, Masjesu avoids high-profile targets, such as Department of Defense IP addresses, opting instead for less conspicuous victims. This botnet employs XOR encryption to maintain low visibility and ensure its persistence within compromised systems. As the use of IoT devices continues to rise, the potential for such botnets to disrupt services and cause damage increases, making it crucial for users and organizations to secure their devices against such threats. The activity of Masjesu raises concerns about the growing sophistication of DDoS services that are accessible for hire, which can have widespread implications for network stability and security.

Impact: IoT devices, specifically those vulnerable to DDoS attacks
Remediation: Users should regularly update their IoT devices, change default passwords, and implement network security measures to protect against unauthorized access.
Read Original

Rostelecom, a major state-run telecommunications company in Russia, reported a significant distributed denial-of-service (DDoS) attack on Monday. This incident disrupted internet access, government services, and online banking for users in 30 cities across the country. The attackers behind the DDoS attack have not yet been identified. This incident is concerning as it affects essential services, highlighting vulnerabilities in critical infrastructure that could have broader implications for national security and public safety. The scale of the attack raises questions about the resilience of state-run systems against cyber threats.

Impact: Internet access, government services, online banking in 30 cities across Russia.
Remediation: N/A
Read Original

The U.S. Justice Department, in collaboration with international law enforcement agencies, has successfully disrupted four Internet of Things (IoT) botnets responsible for massive distributed denial-of-service (DDoS) attacks. These attacks peaked at an astonishing 30 terabits per second, marking them as some of the largest ever recorded. The coordinated effort involved shutting down the infrastructure that allowed these botnets to operate, which had been harnessing compromised IoT devices to flood networks with traffic. This disruption is significant as it not only diminishes the threat of future attacks from these specific botnets but also sends a strong message about the vulnerabilities present in IoT devices. Users and manufacturers alike are reminded of the importance of securing their devices against potential exploitation.

Impact: IoT devices, including smart home appliances and security cameras
Remediation: Users should secure their IoT devices by changing default passwords, keeping firmware updated, and disabling unnecessary features.
Read Original

Akamai's latest security report reveals that internet-facing systems are facing increasing levels of malicious traffic, particularly targeting APIs, web applications, and DDoS channels. From January 2024 to December 2025, the number of web attacks aimed at applications and APIs has steadily risen, indicating a growing threat to organizations that rely on these technologies. This uptick in malicious activity suggests that attackers are honing their skills and strategies, making it crucial for companies to enhance their security measures. As APIs become more integral to business operations, understanding and mitigating these risks is essential for protecting sensitive data and maintaining service availability. Organizations should prioritize monitoring and defending their API infrastructures to counter these persistent threats.

Impact: APIs, web applications
Remediation: Organizations should enhance security measures for APIs and web applications, including monitoring traffic and implementing robust security protocols.
Read Original

Security researchers have identified two new malware strains specifically targeting Linux-based network devices. These malicious programs are being used by financially motivated cybercriminals, marking a shift from their previous association with nation-state espionage. The malware can facilitate distributed denial-of-service (DDoS) attacks and enable unauthorized cryptocurrency mining. This development is concerning as it indicates that attackers are now exploiting vulnerabilities that were once primarily used for geopolitical purposes. Organizations using Linux network devices need to be vigilant and enhance their security measures to protect against these evolving threats.

Impact: Linux-based network devices
Remediation: Organizations should enhance security measures on Linux network devices, including regular updates and monitoring for unusual activity.
Read Original
Page 1 of 3Next