<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: botnets

ThreatSTOP's Hottest Content of the Year

Wondering what our readers were most interested in over the past year? Wonder no more! We've rounded up our most read articles of the year to save you time. Wrapping up the worldwide roller coaster that was 2020, we wish we were feeling a little more nostalgic. Covid-19 came in like a tornado and changed up our daily lives as we knew them. The security industry, accordingly, also had to change mindsets and processes to adjust to a new, distributed-access-focused reality.

The Best, according to you:

Read More

Share this:

BOTNETS 101: INFAMOUS BOTNETS OF THE 21ST CENTURY

A botnet is a distributed network consisting of many compromised internet-connected devices, which are controlled by a centralized botmaster, and are utilized to perform synchronized tasks. Each infected machine is called a bot, and together their power is used to carry out various attacks. Botnets are usually created via malware infections, which gain persistence on the machines and “recruit” them to the botnet. Some of these malware variants can even self-propagate through networks, infecting many devices via one network entry point. The bandwidth amount “taken” from each bot is relatively small, so that the victim will not realize that their device is being exploited, but when thousands or even millions of machines are simultaneously instructed to perform a joint, targeted attack, the damage can be immense.

Although we are used to thinking of botnets as a collection of computers, these networks can be comprised of various types of devices – personal computers, laptops, mobile devices, smart watches, security cameras, and smart house appliances.

Our Security Research Team has created a timeline of the  most famous, dangerous and costly botnets of the century. Download the timeline here, or check it out at the bottom of this post.
Read More

Share this:

Think Mirai is Gone? Think Again. It’s Alive & Active. Here's What You Need to Know.

Between March 2 - 5, we detected a significant increase in scanning activities over Tenet ports via the target, ''NoThink! Telnet HoneyPot – IPs," provided by NoThink. To put this in perspective, the magnitude includes an increase of 4,000 IPs to about 130,000 IPs that were a part of the scanning on telnet ports, as presented in Figure 1 below.

Read More

Share this:

Your favorite Android games, now part of the latest botnet...

That link your friend just sent you for a free version of Angry Birds? I wouldn't click it. But many have and are now sending out enough SMS messages to make any spammer applaud.

Read More

Share this:

With Bots Behind the Attack...EVERYONE is a Target

BloombergTV did a recent segment that was quite interesting with Imperva's CEO, Shlomo Kramer. Kramer speaks of the shift in malicious activity across the internet, with bots now leading the charge as opposed to humans with malicious intent.

Read More

Share this:

ThreatSTOP Releases ThreatCHECK (FREE App) to Help Fight Online Fraud and Stolen Logins and Credit Cards

ThreatSTOP has released ThreatCHECK, a free applet for Windows users to check what we know about the IP addresses their computer connects to. This is the most reliable way to determine who the computer is really talking to. ThreatCHECK will provide a report identifying which countries the IPs are in, and call out known botnet and malware sites along with detailed research about them.  ThreatCHECK is easy to download and can be run in the background.  To download: www.threatstop.com/threatcheck

Read More

Share this:

ThreatSTOP integrated into DDoS Protection Service

In another illustration of ThreatSTOP's wide-ranging value proposition for different use cases and customers, we have been integrated into a multi-layered DDoS (distributed denial of service) protection service provided by British service provider Simwood.  ThreatSTOP will be Layer B of the service (out of 4 layers)  that drops “dirty traffic” from malware and botnet sites at the IP level, which is a very efficient approach to increase clean traffic for the network.  ThreatSTOP uses only 2-8% of the comparable bandwidth to filter inbound traffic compared with packet inspection products prevalent in the market.

Read More

Share this:

ARCHIVES

see all

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter