CISO2CISO Editor 2@ciso2ciso.com - 40d
Cloudflare successfully mitigated a record-breaking 5.6 Tbps Distributed Denial of Service (DDoS) attack on October 29, 2024. The attack, launched by a Mirai-variant botnet, targeted an internet service provider (ISP) in East Asia. The botnet comprised of 13,000 compromised IoT devices flooding the target with malicious data, which aimed to cripple the ISP’s operations.
The attack lasted only 80 seconds, but Cloudflare's autonomous defence systems promptly identified and mitigated the anomalous traffic without human intervention, intercepting and neutralizing the malicious data at Cloudflare's edge nodes. Each IP address within the botnet generated an average traffic of approximately 4 Gbps. The successful defense highlights the escalating sophistication and scale of DDoS threats, with hyper-volumetric attacks exceeding 1 Tbps dramatically increasing. This incident underscores the importance of robust DDoS mitigation strategies and the need for continuous evolution in network security. Recommended read:
References :
MalBot@malware.news - 52d
Check Point Research has identified a new version of the Banshee macOS stealer, a malware linked to Russian-speaking cyber criminals that targets macOS users. This updated version of the Banshee stealer uses the same string encryption algorithm as Apple's XProtect antivirus engine, allowing it to evade detection. The stealer operates as a 'stealer-as-a-service' and is used to steal browser credentials, cryptocurrency wallets, user passwords, and sensitive file data. It was initially distributed through malicious GitHub repositories and phishing websites which also targeted Windows users with Lumma Stealer.
The Banshee malware has seen a number of changes, with its original source code being leaked on underground forums, which ultimately led to the author shutting down their operations. Despite the shutdown, threat actors continue to distribute this new version of Banshee via phishing websites. The malware is designed to infiltrate macOS systems by using anti-analysis methods to evade debugging tools and antivirus engines by blending into legitimate processes. It has the ability to compromise cryptocurrency wallets, steal sensitive data, and deceive users with fake pop-ups to reveal their passwords. Recommended read:
References :
@CSO Online - 40d
A new report reveals that over 4.2 million internet hosts, including VPN servers, routers, and CDN nodes are vulnerable to attacks due to unsecured tunneling protocols. These protocols, such as IP6IP6, GRE6, 4in6, and 6in4, lack proper authentication and encryption, allowing attackers to hijack these systems for anonymous attacks, gain unauthorized access to networks, and launch amplified denial-of-service (DoS) attacks. The vulnerabilities stem from the fact that these protocols do not verify the sender's identity or encrypt data, creating an opening for malicious traffic injection.
Researchers have identified specific CVE identifiers for these vulnerabilities including CVE-2024-7595 (GRE and GRE6), CVE-2024-7596 (Generic UDP Encapsulation), and CVE-2025-23018/23019 (IPv4-in-IPv6 and IPv6-in-IPv4). Successful exploitation allows threat actors to abuse vulnerable systems as one-way proxies, conduct denial-of-service attacks using methods like "Ping-Pong Amplification," and perform man-in-the-middle attacks. It has been found that almost 40% of vulnerable Autonomous Systems fail to filter spoofing hosts, which greatly amplifies the risk. Experts recommend using security protocols like IPSec or WireGuard to secure systems against these attacks. Recommended read:
References :
@securityboulevard.com - 19d
Gcore's Q3-Q4 2024 Radar report reveals a significant 56% year-on-year increase in DDoS attacks, highlighting a steep long-term growth trend. The report indicates a concerning escalation in the total number of DDoS attacks and their magnitude, with the largest attack peaking at 2 Tbps, an 18% increase from Q1-Q2 2024. DDoS attacks are also becoming shorter in duration but more powerful.
The gaming industry remains the most targeted sector, accounting for 34% of all attacks. However, the financial services sector experienced a significant surge, accounting for 26% of all DDoS attacks, up from 12% in the previous period. The technology industry also saw a steady increase in its share of DDoS attacks. The increase to the technology sector increasing from 7% to 19% since Q3-Q4 2023. This shift shows DDoS attackers recognize the wide-reaching disruption potential of attacking technology services. Recommended read:
References :
@www.bleepingcomputer.com - 37d
References:
ciso2ciso.com
, BleepingComputer
,
Cloudflare has recently mitigated a record-breaking 5.6 Tbps DDoS attack, showcasing the increasing sophistication and scale of cyber threats. The attack, a Mirai-variant botnet attack, originated from approximately 13,000 IoT devices and targeted an East Asian Internet Service Provider. This follows a previous 3.8 Tbps DDoS attack mitigated by Cloudflare in October 2024. The new attack which lasted only 80 seconds and was successfully defended by Cloudflare's automated systems, highlights a worrying trend of escalating hyper-volumetric attacks, with attacks over 1Tbps increasing by a staggering 1,885% from the previous quarter. The company also noted a 53% increase in the frequency of all DDoS attacks throughout 2024, blocking an average of 4,870 attacks per hour.
A vulnerability in Cloudflare's CDN has also been identified that could expose users' general location. This vulnerability, discovered by a security researcher, allows a person's location to be determined by simply sending an image on platforms such as Signal and Discord. Cloudflare's CDN caches media at data centers closest to users, allowing their general location to be determined through cached responses to an image. It was found that this type of location tracking could achieve an accuracy between 50 and 300 miles, potentially creating privacy and security concerns. While Cloudflare has addressed the specific vulnerability, it has been noted that location attacks could still be performed via other methods. Recommended read:
References :
CISO2CISO Editor 2@ciso2ciso.com - 38d
References:
ciso2ciso.com
,
,
Cloudflare has successfully mitigated a massive 5.6 Tbps Distributed Denial-of-Service (DDoS) attack, a record-breaking event highlighting the increasing threat of hyper-volumetric assaults. The attack, originating from a Mirai-variant botnet, targeted an East Asian Internet Service Provider on October 29th and lasted for 80 seconds. This incident underscores the growing sophistication and scale of DDoS threats, with this particular attack leveraging over 13,000 compromised IoT devices. Cloudflare's autonomous defense systems were able to promptly mitigate the attack.
The Mirai-variant botnet, known as "Murdoc," is exploiting vulnerabilities in AVTECH IP cameras and Huawei HG532 routers using CVE-2024-7029 and CVE-2017-17215. The Murdoc botnet campaign uses ELF files and shell scripts for propagation, downloading and executing malicious payloads on devices. The botnet has been found on over 1300 identified IPs and uses more than 100 command-and-control servers. This has resulted in a significant global impact, with Malaysia, Thailand, Mexico, and Indonesia being the most affected. In 2024, Cloudflare blocked 21.3 million DDoS attacks, a 53% year-over-year increase, and 420 attacks in Q4 exceeded 1 Tbps. Recommended read:
References :
|