Close Menu
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
Home»Software»An IoT botnet is partly behind Friday’s massive DDOS attack
Software

An IoT botnet is partly behind Friday’s massive DDOS attack

DeepBy DeepOctober 22, 2016No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

ddos

Malware that can build botnets out of IoT devices is at least partly responsible for a massive distributed denial-of-service attack that disrupted U.S. internet traffic on Friday, according to network security companies.

Since Friday morning, the assault has been disrupting access to popular websites by flooding a DNS service provider called Dyn with an overwhelming amount of internet traffic.

Some of that traffic has been observed coming from botnets created with theMirai malware that is estimated to have infected over 500,000 devices, according to Level 3 Communications, a provider of internet backbone services.

About 10 percent of those Mirai infected devices are participating in Friday’s DDOS attack, said Dale Drew, the company’s chief security office in Periscope livestream. However, other botnets are also partaking in the attack, he added.

DDOS attacks and botnets are nothing new. However, the Mirai malware appears especially worrisome for its awesome power. An attack on the website of cybersecurity Brian Krebs last month managed to deliver 665Gbps of traffic to Kreb’s site, making it one of the largest DDOS attacks ever recorded.

Unlike other botnets that rely on PCs, the Mirai malware targets internet-connected devices such as cameras and DVRs that have weak default passwords, making them easy to infect. Adding to the worry is that the developer behind Mirai has released the malware’s source code to the hacker community.

Security firm Flashpoint said it has been able to confirm that some of the Mirai-infected machines involved in Friday’s attack are DVRs.

The botnets participating in Friday’s assault, however, are separate and distinct from those used to take down Kreb’s website back In September, the security firm said.

Both Level 3 and Flashpoint have said copycat hackers have been trying to exploit the Mirai code since it was publicly released.

Friday’s attack is still ongoing, according to Dyn. Its engineers are trying to mitigate “several attacks” aimed at its infrastructure. The company has also reportedly said that the DDOS attacks are coming from “tens of millions of IP addresses at the same time.”

source”gsmarena”

An attack behind botnet DDOS Friday's IoT is massive partly
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Deep

Related Posts

DevSecOps Tools: Powering Secure, AI-Driven Software Delivery

March 17, 2026

What is System Software: Features and Components

July 8, 2025

Best AI Writing Software

July 7, 2025
Recent Post
  • Mastering Sibling Rivalry: Practical Ways to Build a Peaceful and Happy Home
  • Turning Education into Opportunity: Creating Real Pathways to Work for Every Young Person
  • DevSecOps Tools: Powering Secure, AI-Driven Software Delivery
  • 11 Best Social Media Analytics Tools for Creators and Marketers
  • Both positive and negative effects of social media on students
  • How to Build a Social Media Strategy in 2026: A Practical 9-Step Guide
  • Beyond the Checkbox: Rethinking What Meaningful Consent Really Means
  • Can social media ban save our future generation?
Search
  • Home
  • Privacy Policy
  • Contact Us !
© 2026 BlogSpotTips. Designed by BlogSpotTips.

Type above and press Enter to search. Press Esc to cancel.