Earlier this week, EPCYBER has identified a large scale network of Chinese botnet as-a-service which consists of various domains, over 20 active telegram groups and other domestic communication channels using Chinese infrastructure.
It is evident that the methods and botnet developed and used by the group, successfully bypasses latest DDoS protection of popular vendors such as CloudFlare and others – which puts Western targets at risk of denial of service attacks despite protections in place.
By infosecbulletin
/ Thursday , September 5 2024
CISCO released security updates for two critical security flaws impacting its smart Licensing Utility that could allow unauthenticated, remote attackers...
Read More
By infosecbulletin
/ Wednesday , September 4 2024
OpenBAS is a platform that helps organizations to plan, schedule, and conduct crisis exercises, adversary simulations, and breach simulations. OpenBAS...
Read More
By infosecbulletin
/ Wednesday , September 4 2024
Zyxel has released software updates to fix a serious security issue in certain access point (AP) and security router versions....
Read More
By infosecbulletin
/ Tuesday , September 3 2024
VMware released a security advisory for a major vulnerability in the VMware Fusion product. This vulnerability could be exploited by...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
Indian Computer Emergency Response Team (CERT-IN) issued advisories about multiple vulnerabilities in various Palo Alto Networks applications. Attackers could exploit...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
Malaysia is quickly becoming a leading choice for investing in data centers. It aims to generate RM3.6 billion (US$781 million)...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
US authorities have issued a cybersecurity advisory about a ransomware group called RansomHub. The group is thought to have stolen data...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
There is a new way to attack Atlassian Confluence using the vulnerability CVE-2023-22527. The Confluence Data Center and Server products...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
The Cicada3301 ransomware is made in Rust and attacks Windows and Linux/ESXi hosts. Truesec researchers examined a version that targets...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
Lloyds Bank and Virgin Money's internet banking services were down on Monday, causing trouble for users to access and view...
Read More
Among the targets shared within these groups are popular domains of companies operating in different sectors and industries, of multiple countries in Europe.
Screenshot of one of the channel in which it is reported that a target website has successfully executed a distributed denial of service (DDoS) attack on it, despite the fact that DDoS protections are already in place.
gbhacker reported ” The attackers can then use the botnet’s combined processing power to disrupt operations, steal data, or launch denial-of-service attacks that overwhelm targeted systems with traffic, rendering them inaccessible to legitimate users.
Even if a target is using these well-known DDoS protection services, it is still at risk of being offline due to a denial-of-service attack because a group has developed strategies and a botnet that can bypass the most recent DDoS protection solutions from CloudFlare and other vendors.” Click here to read the full report.