1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Over 100 DDoS botnets built using Linux malware for embedded devices

Discussion in 'Network World' started by RSS, Jun 30, 2016.

  1. RSS

    RSS New Member Member

    LizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised Internet-of-Things devices.

    LizardStresser has two components: A client that runs on hacked Linux-based machines and a server used by attackers to control the clients. It can launch several types of distributed denial-of-service (DDoS) attacks, execute shell commands and propagate to other systems over the telnet protocol by trying default or hard-coded credentials.

    The code for LizardStresser was published online in early 2015, giving less-skilled attackers an easy way to build new DDoS botnets of their own. The number of unique LizardStresser command-and-control servers has steadily increased since then, especially this year, reaching over 100 by June, according to researchers from DDoS mitigation provider Arbor Networks.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page