Cloudflare mitigated a record-breaking 5.6 Tbps DDoS attack, the largest ever reported. The attack, based on the Mirai botnet, involved over 13,000 IoT devices and targeted an unnamed internet service provider customer. This highlights the growing threat of hyper-volumetric assaults and the need for robust DDoS mitigation strategies.
The Mirai botnet, known for exploiting vulnerabilities in IoT devices, continues to evolve and pose a significant threat to internet infrastructure. The attack underscores the importance of securing IoT devices and implementing comprehensive DDoS protection measures to safeguard against increasingly sophisticated and large-scale attacks.
Cloudflare mitigated a massive 5.6 Tbps DDoS attack, showcasing the increasing threat of hyper-volumetric assaults. This record-breaking attack was a Mirai-variant DDoS, which highlights the importance of robust security measures against evolving DDoS attack techniques. In addition, a vulnerability was discovered in Cloudflare’s CDN that could expose a person’s general location by sending an image on platforms like Signal and Discord. Cloudflare conducts media caching at the data center closest to its users. The location information is exposed due to the delivery of a unique image through Cloudflare’s CDN. This could reveal private information.
A new version of the Banshee macOS stealer has been identified by Check Point Research. This malware, linked to Russian-speaking cyber criminals, employs a string encryption algorithm identical to that used by Apple’s XProtect antivirus engine. The stealer, which operates as a ‘stealer-as-a-service’, targets macOS users, stealing browser and login credentials, cryptocurrency wallets, and other sensitive information. Its distribution methods include malicious GitHub repositories and phishing websites. This incident highlights the increasing sophistication of macOS malware and the use of legitimate security algorithms for malicious purposes.
Juniper Networks has issued a warning regarding the Mirai botnet exploiting Session Smart Routers (SSR) due to unchanged default passwords. The Mirai botnet is actively targeting these devices, which could lead to significant security breaches. It is crucial for Juniper SSR users to immediately change the default password to prevent infection and secure their systems against this threat. This highlights the critical importance of strong password hygiene.