Posts Tagged ‘DDOS-attack’

BotnetIn 2007, the attention of researchers of information security has attracted P2P-botnet, created by a malicious program known as the Storm Worm (classified “Kaspersky Lab” – Email-Worm.Win32.Zhelatin).

The authors of “Storm” worm spread their offspring are very active: apparently, they have created an entire factory to create new versions of the malicious program.

Some experts believe that the “Storm” Worm is a malicious program for the construction of a zombie network of new generation. The fact that the bot was designed and distributed by professionals in their field, and the architecture and the protection of zombie networks are well thought out, according to the following characteristics of the “Storm” botnet: (more…)

DDoS attack alertDDoS-attack – Distributed Denial of service, which is one of the most common and dangerous network attacks.

In attack disrupted or completely blocked service attacks, network, systems and other resources. Most DDoS-attacks exploit vulnerabilities in the core protocol Internet (TCP / IP), namely, the method of processing systems request SYN.

There are two main types of attacks that cause a denial of service

  • As a result of the attack of the first type, stops the entire system or network. Hacker sends system data or packets that it does not expect, and it stops the system or it is rebooted.
  • The second type of DDoS-attacks cause an overflow of the system or network with a huge amount of information that can not be processed. (more…)

Doctor WebThe company “Doctor Web” – a Russian developer of IT security – inform users of the distribution through peer to peer networks Trojan.PWS.Panda.2395 several malicious programs that use a very interesting mechanism to infect computers. These programs are capable of massive DDoS-attacks and send spam.

Infection of the victim’s computer by using the widespread Trojan Trojan.PWS.Panda.2395. In the first stage of infection by Trojan-supported peer to peer network to a PC victims downloaded the executable file that is encrypted malicious module. After successfully decrypt it launches another module that reads the image in computer memory or other malicious applications detected by Dr.Web anti-virus software as one of the members of the family Trojan.DownLoader.

The program is saved to a user account as an executable file with a random name, and then modifies the registry Windows, to give yourself the ability to automatically run along with the operating system loads. (more…)

AnonymousAmerican company Imperva, which develops solutions for data protection, published its 17-page report on the study of a certain of hackers group Anonymous. We can not say that the report reveals the terrible conspiracy attacks, but, nevertheless, as a systematic picture of it is very convenient.

So, according to the report, Anonymous – this is not a group of hackers capable of in a few hours or days to hack any server and steal any information. Although there were precedents for the successful attack on such a reputable organization as StratFor and others, the success of an attack due more to carelessness resource managers, not any super engineering attacks. So the researchers believe that while Anonymous and have some specific techniques, however, the group prefers well-known techniques – first of all, this SQL-injection and DDOS-attack, and, Anonymous, usually first try to steal data, and then if it is not crowned with success, organize DDOS victim to the resource. (more…)