Linux botnet attack target 90% located in Asia

Source: Internet
Author: User

Linux botnet attack target 90% located in Asia

Akamai, a security company, has discovered a Linux botnet XOR DDoS attack. It targets at least 20 websites every day, and nearly 90% of target websites are located in Asia. Botnet refers to the use of one or more transmission means to infect a large number of hosts with bot programs, thus, a one-to-multiple control network is formed between the Controller and the infected host. Attackers spread botnets in various ways to infect a large number of hosts on the Internet, and the infected hosts receive instructions from attackers through a control channel to form a botnet.

Botnets are extremely dangerous and have a profound impact. Once a machine is controlled, you can only operate on it. The key is that you are not aware of this. For attackers, it is the best way to remotely control multiple devices and terminals at the same time, and this network is very concealed and difficult to detect. Therefore, it is also the most intimate crime tool for hackers.

Botnets are usually used by hackers to launch published Denial of Service (DDoS) attacks. In this attack, attackers use zombie XOR DDoS to hijack Linux machines and add them to botnets, to initiate DDoS attacks. According to Akamai reports, the DDoS attack bandwidth of XOR DDoS botnets has increased from several billion bytes per second (Gbps) to more than 150 Gbps. The gaming industry is its primary target, followed by educational institutions. This morning, Akamai SIRT released a Security Threat Report by the security response engineer Tsvetelin 'Vincent 'Choranov.

Researchers found that XOR DDoS attacks depend on Linux machines. From the recently discovered botnets, Linux has become the main target of attacks on botnets. For example, the Spike DDoS toolkit and IptabLes and IptabLex malware launched a large-scale DDoS attack on Linux servers last year.

"A decade ago, Linux was considered the safest operating system, and many companies have introduced it. However, as the Linux system environment expands, there are more potential opportunities for attackers. They will continue to upgrade their attack policies and tools, and security personnel should continue to strengthen the Linux protection system ." Akamai's team spoke.

This article permanently updates the link address:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.