Linux botnet attack target 90% located in Asia
Akamai, a security company, has discovered a Linux botnet XOR DDoS attack. It targets at least 20 websites every day, and nearly 90% of target websites are located in Asia. Botnet refers to the use of one or more transmission means to infect a large number of hosts with bot programs, thus, a one-to-multiple control network is formed between the Controller and the infected host. Attackers spread botnets in various ways to infect a large number of hosts on the Internet, and the infected hosts receive instructions from attackers through a control channel to form a botnet.
Botnets are extremely dangerous and have a profound impact. Once a machine is controlled, you can only operate on it. The key is that you are not aware of this. For attackers, it is the best way to remotely control multiple devices and terminals at the same time, and this network is very concealed and difficult to detect. Therefore, it is also the most intimate crime tool for hackers.
Botnets are usually used by hackers to launch published Denial of Service (DDoS) attacks. In this attack, attackers use zombie XOR DDoS to hijack Linux machines and add them to botnets, to initiate DDoS attacks. According to Akamai reports, the DDoS attack bandwidth of XOR DDoS botnets has increased from several billion bytes per second (Gbps) to more than 150 Gbps. The gaming industry is its primary target, followed by educational institutions. This morning, Akamai SIRT released a Security Threat Report by the security response engineer Tsvetelin 'Vincent 'Choranov.
Researchers found that XOR DDoS attacks depend on Linux machines. From the recently discovered botnets, Linux has become the main target of attacks on botnets. For example, the Spike DDoS toolkit and IptabLes and IptabLex malware launched a large-scale DDoS attack on Linux servers last year.
"A decade ago, Linux was considered the safest operating system, and many companies have introduced it. However, as the Linux system environment expands, there are more potential opportunities for attackers. They will continue to upgrade their attack policies and tools, and security personnel should continue to strengthen the Linux protection system ." Akamai's team spoke.
This article permanently updates the link address: