What appears to be a new version of the Mirai malware was behind a massive DDoS attack that targeted an unnamed US college and lasted for 54 hours straight, reports cyber-security firm Incapsula, who was providing DDoS mitigation service for the affected college.
The US Department of Justice announced yesterday that Maxim Senakh, 41, of Velikii Novgorod, Russia, pleaded guilty for his role in the creation of the Ebury malware and for maintaining its infamous botnet.
A botnet specialized in gift card fraud is using the infrastructure of nearly 1,000 websites to check the balance of several types of electronic gift cards in order to defraud legitimate card owners.
The Necurs botnet is back and active again, but instead of spreading the Locky ransomware or the Dridex banking trojan, its operators are engaged in a spam scheme that tries to boost a company's stock market price artificially.
A new malware strain named Imeij has been detected in the wild targeting equipment made by Taiwanese manufacturer AVTech. According to Trend Micro researchers, the malware is exploiting a security flaw which AVTech engineers failed to patch in October 2016.
German police announced today that fellow UK police officers have arrested a suspect behind a serious cyber-attack that crippled German ISP Deutsche Telekom at the end of November 2016.
Security researchers have stumbled upon a Windows trojan that hackers are using to help with the distribution of the infamous Mirai Linux malware, used to infect IoT devices and carry out massive DDoS attacks.
An unknown group/person is building a botnet using a new version of the Ragebot botnet malware, one that includes worm features that allow it to spread on its own to new devices.
For more than four weeks, the only source of Locky ransomware infections has been through spam campaigns that distributed the Kovter click-fraud malware, as the primary source of Locky infections, the Necurs botnet, has been offline for the Christmas and New Year holidays.
Security researcher MalwareHunterTeam discovered today a new malware family that can infect computers and allow crooks to take control of these PCs using commands sent via an IRC channel.
Recent variants of the "Merry Christmas" ransomware, also known as Merry X-Mas, are also downloading the DiamondFox malware on infected computers, which is used by the ransomware's operators to collect data from infected hosts, such as passwords, sensitive files, and others.
Mirai-based DDoS botnets have lost the exclusivity on high output DDoS attacks, according to DDoS mitigation firm Imperva, who says that it mitigated a DDoS attack of over 650 Gbps and over 150 million packets per seconds (Mpps) on December 21.
Last week, the Swiss Governmental Computer Emergency Response Team (GovCERT), together with SWITCH, the registrar of .ch top-level domain names, have taken action against the Tofsee malware botnet that was abusing Swiss domains to host its dynamic command and control (C&C) servers.
Somebody is building a botnet by infecting Linux servers and Linux-based IoT devices with a new malware strain named Rakos. First detected online over the summer, this new malware strain is harmless, at least in its current variant.
A bot farm involving hundreds of servers and over 570K different IP addresses has caused losses for online video advertisers ranging from $3 to $5M per day. This bot farm, nicknamed Methbot, dates back to Sep 2015, when US security firm White Ops had first detected signs of automated traffic coming from the crook's infrastructure.
Following a failed takedown attempt, changes made to the Mirai malware variant responsible for building one of today's biggest botnets of IoT devices will make it incredibly harder for authorities and security firms to shut it down.
The United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security (DHS), has published a security alert yesterday, warning owners of Netgear R6400 and R7000 models against using their routers for the time being, because of a severe security flaw.
Hundreds of thousands of IP cameras from several vendors are affected by two zero-day vulnerabilities that allow an attacker to hijack the device, use it as a pivot point for other attacks, or spy on the camera's owner.