<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Botnet Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/botnet/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/botnet/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:11:51 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Botnet Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/botnet/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 093 Botnets</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-093-botnets/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 03 Sep 2021 07:15:13 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Bot]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Botnets]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Compromised Devices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Denial of Service]]></category>
		<category><![CDATA[Denial of Service Attack]]></category>
		<category><![CDATA[Distributed Denial of Service]]></category>
		<category><![CDATA[Distributed Denial of Service Attack]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Shodan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2597</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 93. This week were going to talk about Botnets. You&#8217;ve mentioned these before Back in #WeekendWisdom number 76, where I talked about connecting devices to the internet and #WeekendWisdom number 84, where I talked about distributed denial-of-service attacks, I mentioned botnets. What are botnets? A botnet is a collection of a&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-093-botnets/">#WeekendWisdom 093 Botnets</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 93. This week were going to talk about Botnets.<span id="more-2597"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2597-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4</a></video></div>
<h3>You&#8217;ve mentioned these before</h3>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-076-connecting-devices-to-the-internet/">#WeekendWisdom number 76</a>, where I talked about connecting devices to the internet and <a href="https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/" target="_blank" rel="noopener">#WeekendWisdom number 84</a>, where I talked about distributed denial-of-service attacks, I mentioned botnets.</p>
<h3>What are botnets?</h3>
<p>A botnet is a collection of a large amount of compromised devices that are connected to the internet.</p>
<h3>How do they get formed?</h3>
<p>There are legitimate services out there that scan the entire internet and every device that is connected to it and it keeps a database of all these devices.</p>
<p>Criminals then using these legitimate services are able to tailor their searches and locate:</p>
<ul>
<li>CCTV cameras</li>
<li>Baby monitors</li>
<li>Digital video recorders</li>
<li>In-house IP cameras</li>
<li>Any other type of device that may be connected to the internet in a very insecure manner</li>
</ul>
<p>If they can detect these through this database, what they can do then is compromises it using maybe:</p>
<ul>
<li>Default credentials</li>
<li>Known compromise</li>
<li>Weak vulnerabilities</li>
</ul>
<p>in those devices. Take them over, add them to their botnet and then they have control of these devices. They give them instructions to carry out a distributed denial of service attack.</p>
<p>So that&#8217;s how these botnets get formed.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-093-botnets/">#WeekendWisdom 093 Botnets</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4" length="30869996" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 084 Distributed Denial of Service Attacks</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 25 Jun 2021 01:15:17 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Bots]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Denial of Service]]></category>
		<category><![CDATA[Denial of Service Attacks]]></category>
		<category><![CDATA[Distributed Denial of Service]]></category>
		<category><![CDATA[Distributed Denial of Service Attacks]]></category>
		<category><![CDATA[DOS]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2551</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 84. This week we&#8217;re going to talk about Distributed Denial of Service Attacks. What are distributed denial of service attacks? A denial of service attack is where a bad actor will use some thing to deny you access to some other service. So for example, a ransomware incident, is where the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/">#WeekendWisdom 084 Distributed Denial of Service Attacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 84. This week we&#8217;re going to talk about Distributed Denial of Service Attacks.<span id="more-2551"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2551-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-084-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-084-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-084-lo.mp4</a></video></div>
<h3>What are distributed denial of service attacks?</h3>
<p>A denial of service attack is where a bad actor will use some thing to deny you access to some other service. So for example, a ransomware incident, is where the criminals, they are using ransomware to deny you access to the service of your computers.</p>
<p>A distributed denial of service attack is slightly different in that the criminals are going to use many, many, many thousands of devices that they control that are called bots and they&#8217;re all in this kind of thing that they call a botnet.</p>
<h3>What can a botnet do?</h3>
<p>It is then used to target an online service or application that your business depends on. Thus they flood it with requests which therefore then drowns out any legitimate requests that you&#8217;re trying to put there to make use of that service.</p>
<h3>So how can you prevent this type of thing?</h3>
<p>Well usually your internet service provider or your application service provider may have some facilities that they can use that control these type of distributed denial of service attacks. So you should contact them if you are in such a situation. It costs money but it&#8217;s well worth it if you want to get access back to your online service.</p>
<p>You can refer back to <a href="https://www.l2cybersecurity.com/weekendwisdom-076-connecting-devices-to-the-internet/" target="_blank" rel="noopener">#WeekendWisdom number 76</a> where I talked about connecting cheap devices to the internet which don&#8217;t have really good security on them and these are usually the devices that make up these botnets.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/">#WeekendWisdom 084 Distributed Denial of Service Attacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-084-lo.mp4" length="32198176" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 075 Backdoors</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 01:15:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Backdoors]]></category>
		<category><![CDATA[Bot]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Persistence]]></category>
		<category><![CDATA[Persistent Access]]></category>
		<category><![CDATA[RAT]]></category>
		<category><![CDATA[Remote Access Trojan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2500</guid>

					<description><![CDATA[<p>come to #WeekendWisdom number 75. This week we&#8217;re going to talk about Backdoors. Where does this term Backdoors come from? A lot of cyber security terminology uses common terms that relate to the real-world. In the real-world, a backdoor is usually the door of a house or building that is around the side or the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/">#WeekendWisdom 075 Backdoors</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>come to #WeekendWisdom number 75. This week we&#8217;re going to talk about Backdoors.<span id="more-2500"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2500-3" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4</a></video></div>
<h3>Where does this term Backdoors come from?</h3>
<p>A lot of cyber security terminology uses common terms that relate to the real-world. In the real-world, a backdoor is usually the door of a house or building that is around the side or the back. This door cannot seen from the front of the building.</p>
<h3>In cyber security terminology?</h3>
<p>In cyber security terms a backdoor is a way in that is unseen, into an appliance or device or to a network.</p>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-061-zyxel-backdoor/" target="_blank" rel="noopener">#WeekendWisdom number 61</a>, I talked about a backdoor to a set of firewalls. This was where the manufacturer had put in place a hardcoded password. This password enabled them to be able to sign into those firewalls through the backdoor.</p>
<h3>What way can hackers use Backdoors?</h3>
<p>But hackers tend to use a bit more sophisticated methods to establish their backdoors. If they break into your network they usually want to try and keep their access on there. So they will usually install some program, some piece of software on one of the devices on the network to establish what we call a persistent connection, where they can just keep coming back.</p>
<p>That&#8217;s just a piece of software that opens up a backdoor. Sets up a communication with the outside world that the hacker controls and that they can use to come back in and continue doing whatever they want to do on your network.</p>
<p>So that&#8217;s what a backdoor is in cyber security terms.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/">#WeekendWisdom 075 Backdoors</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4" length="33413833" type="video/mp4" />

			</item>
		<item>
		<title>Overwhelming attack sets new record.</title>
		<link>https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 09 Mar 2018 10:22:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1166</guid>

					<description><![CDATA[<p>An overwhelming attack on a customer of a US service provider a few days ago has set a new record for the sheer volume of data used in the attack. We&#8217;ve seen records set last year, but this new one is enormous. At it&#8217;s peak, it is reported to have hit 1.7Tbps. For those of you&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/">Overwhelming attack sets new record.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1167" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/DDOS-Attack-150x150.jpg" alt="Overwhelming attack" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/DDOS-Attack-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/DDOS-Attack.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />An overwhelming attack on a customer of a US service provider a few days ago has set a new record for the sheer volume of data used in the attack. <span id="more-1166"></span>We&#8217;ve seen records <a href="https://www.l2cybersecurity.com/internet-of-evil-things-continues-grow/">set last year</a>, but this new one is enormous. At it&#8217;s peak, <a href="https://www.arbornetworks.com/blog/asert/netscout-arbor-confirms-1-7-tbps-ddos-attack-terabit-attack-era-upon-us/">it is reported</a> to have hit 1.7Tbps. For those of you unfamiliar with internet speed measurements, this would be equivalent of 18,000 eirFibre broadband customers using their full internet 100Mbps speed to download data at the exact same time. All of that data would be pointed at a single service.</p>
<h3>What is the source of this overwhelming attack?</h3>
<p>A vulnerability was discovered recently with certain servers that are exposed to the internet. If a certain type of packet was sent to the server with a small amount of data, the server would reply to the packet with a much greater quantity of data &#8211; in <a href="https://www.theregister.co.uk/2018/03/05/worlds_biggest_ddos_attack_record_broken_after_just_five_days/">some cases</a> up to 50,000 times more data.</p>
<p>Now most of you are thinking, well that would mean the server would reply to the sender with a big hunk of data and so overwhelm the bad guy.</p>
<p>The thing about the type of packet in question (officially known as User Datagram Protocol or UDP) is that the sender can change the source address of the packet to &#8220;spoof&#8221; where the packet came from. The vulnerable server will blindly believe that the reply should go to the victim and add lots of additional data. This is all because there is no verification of the source address when UDP packets are used.</p>
<p>So all the evil doer needs to do, is locate a large number of vulnerable servers, send them each a packet of data with the same spoofed source address and the servers will send a greater amount of data back to the victim address and cause an overwhelming attack on any services they have exposed to the internet. The following is a simple diagram of how this works &#8211; in this case a 1 Megabyte request gets amplified to 15 Megabytes:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1168 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Amplification-Attack.jpg" alt="Amplification attack" width="1039" height="730" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Amplification-Attack.jpg 1039w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Amplification-Attack-300x211.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Amplification-Attack-768x540.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Amplification-Attack-1024x719.jpg 1024w" sizes="(max-width: 1039px) 100vw, 1039px" /></p>
<h3>So what can I do if I get hit?</h3>
<p>If you fall victim to one of these attacks, the evil doers may contact you and demand a ransom payment to stop the attack.</p>
<p>Your first place to call is your Internet Service Provider (ISP). They may have a facility to mitigate such attacks or they can engage a third party company to do so. These services may not be cheap however &#8211; so you&#8217;ve got to balance this cost against any ransom that may be demanded.</p>
<p>Bear in mind, that if you do pay the ransom once, the chances are you&#8217;ll do so again (at least one more time).</p>
<p>My advice is don&#8217;t pay the ransom.</p>
<p>Engage the good guys to mitigate the attack.</p>
<p>Finally report the crime to <a href="https://www.garda.ie/en/">An Garda Síochána</a>.</p>
<p>What? Why???</p>
<p>A crime was committed.</p>
<p>No, they probably won&#8217;t be able to do anything about it.</p>
<p>But the more reports that the Gardai record on cyber crime, these will begin to factor in their statistics, which will mean once the scale of cyber crime is seen, they will begin to receive an adequate budget to deal with this type of crime, which they badly need.</p>
<p>The post <a href="https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/">Overwhelming attack sets new record.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Internet of Evil Things continues to grow.</title>
		<link>https://www.l2cybersecurity.com/internet-of-evil-things-continues-grow/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 11:40:54 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=567</guid>

					<description><![CDATA[<p>The first time I saw that picture of the Dr. Evil meme, I never thought that it might be possible for the numbers to reach those nonsensical values, but if Internet connected brooms are in our future (see below), we might be in serious trouble, if the manufacturers of such devices keep ignoring the need&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/internet-of-evil-things-continues-grow/">The Internet of Evil Things continues to grow.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://3.bp.blogspot.com/-7KQHoJjbBTw/WBCU_trfElI/AAAAAAAAAcA/PF6Sx_88g9wFab3Zg5dZAqJdFfHJCnDcgCLcB/s1600/IoT%2BDevices.jpg" data-blogger-escaped-style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img decoding="async" class="alignleft" src="https://3.bp.blogspot.com/-7KQHoJjbBTw/WBCU_trfElI/AAAAAAAAAcA/PF6Sx_88g9wFab3Zg5dZAqJdFfHJCnDcgCLcB/s320/IoT%2BDevices.jpg" width="320" height="237" border="0" /></a></p>
<p>The first time I saw that picture of the Dr. Evil meme, I never thought that it might be possible for the numbers to reach those nonsensical values, but if Internet connected brooms are in our future (see below), we might be in serious trouble, if the manufacturers of such devices keep ignoring the need for easily configured security settings on their gear.</p>
<p>The <a href="http://en.wikipedia.org/wiki/Mirai_(malware)" data-blogger-escaped-target="_blank">Mirai Botnet</a>, which was responsible for the historic attack on <a href="http://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/" data-blogger-escaped-target="_blank">Brian Krebs website</a>, amongst others last month has grown dramatically. I came across this <a href="http://intel.malwaretech.com/botnet/mirai/?h=24" data-blogger-escaped-target="_blank">Botnet tracking website</a>, which gives details of the number of infected hosts in the Mirai Botnet a few hours ago. At that time the total number of hosts was 1,479,110. It is now showing 1,547,552 (it&#8217;ll be higher by the time you read this ?) That means on a Wednesday morning in late October, another 68,000 devices have been hacked and are ready to be used for evil purposes. It is believed that last Friday&#8217;s <a href="http://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/" data-blogger-escaped-target="_blank">massive attack on Dyn</a>, which crippled such services as Twitter, Amazon, Spotify, PayPal and Netflix, was partly as a result of the Mirai Botnet according to <a href="http://www.flashpoint-intel.com/action-analysis-mirai-botnet-attacks-dyn/" data-blogger-escaped-target="_blank">Flashpoint</a>.<span id="more-567"></span></p>
<p>Granted the total number of affected hosts is likely to be a lot lower as some of the earlier compromised devices may have been reset or disconnected from the internet either by their owners or by ISPs who detect such devices and block them.</p>
<p>Following the initial attack on Brian Krebs in September, I had <a href="http://www.l2cybersecurity.com/iot-devices-hacked/" data-blogger-escaped-target="_blank">blogged</a> encouraging everyone to change the default passwords on their IP cameras and DVRs. However, it has become apparent that a particular make of these devices has a hard coded backdoor which is not under the control of the user. <a href="http://krebsonsecurity.com/2016/10/iot-device-maker-vows-product-recall-legal-action-against-western-accusers/" data-blogger-escaped-target="_blank">According to Brian Krebs</a>:</p>
<blockquote><p><em>The scary part about IoT products that include XiongMai’s various electronics components, Flashpoint found, was that while users could change the default credentials in the devices’ Web-based administration panel, the password is hardcoded into the device firmware and the tools needed to disable it aren’t present.</em></p></blockquote>
<p>These affected devices will need new firmware to be installed on them to remove this backdoor, but (a) there is no sign of any and (b) given the numbers involved, it would be unlikely that even 1% would get updated, and that is me being wildly optimistic. ?</p>
<p>I want to finish on a couple of light notes &#8230; as <a href="http://twitter.com/jjarmoc/status/789637654711267328" data-blogger-escaped-target="_blank">whimsically stated</a> by Jeff Jarmoc, &#8220;In a relatively short time we&#8217;ve taken a system built to resist destruction by nuclear weapons and made it vulnerable to toasters,&#8221; How very, very true. ?</p>
<p>And if you wondered what I was talking about in regards to an Internet connected broom above &#8211; this is where that came from &#8211; the Internet of Evil Things:</p>
<p><img loading="lazy" decoding="async" class="wp-image-568 aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/IoET-300x264.jpg" alt="Internet of Evil Things" width="569" height="500" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/IoET-300x264.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/IoET.jpg 740w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p>The post <a href="https://www.l2cybersecurity.com/internet-of-evil-things-continues-grow/">The Internet of Evil Things continues to grow.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Details emerge about the huge internet attack last Friday.</title>
		<link>https://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 24 Oct 2016 17:02:03 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=564</guid>

					<description><![CDATA[<p>I&#8217;m sure you&#8217;ve all heard about the internet attack in the US last Friday, where sites such as Twitter, Amazon, Spotify, PayPal and Netflix (amongst others) were taken offline (effectively). This was done by what is called a Distributed Denial Of Service (DDOS) attack and it targeted a company called Dyn, which provides all of&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/">Details emerge about the huge internet attack last Friday.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-qxDw6fIyWyY/WA4-DQnHl4I/AAAAAAAAAbo/wGAegsvaIogW-_jR7bz_UwJYhokYXAwvgCLcB/s1600/Talkie%2BToaster.gif" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-qxDw6fIyWyY/WA4-DQnHl4I/AAAAAAAAAbo/wGAegsvaIogW-_jR7bz_UwJYhokYXAwvgCLcB/s1600/Talkie%2BToaster.gif" width="399" height="202" border="0" /></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">I&#8217;m sure you&#8217;ve all heard about the internet attack in the US last Friday, where sites such as Twitter, Amazon, Spotify, PayPal and Netflix (amongst others) were taken offline (effectively).</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">This was done by what is called a Distributed Denial Of Service (DDOS) attack and it targeted a company called Dyn, which provides all of those companies with a specific service. It is believed that this attack was carried out by a huge number of hacked security cameras and their associated Digital Video Recorders (DVRs), flooding the service with billions of requests which it could not handle. I talked about these hacked devices last month in <a href="http://www.l2cybersecurity.com/iot-devices-hacked/">this blog post</a>.</span></p>
</div>
<p><span id="more-564"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Since then the hacker that created the computer code to take control of the cameras, has released it to the internet, so it looks like some new bad guys may have stepped it up a bit as there was mention of between 500,000 and 1,000,000 devices being used last Friday.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">This is a very worrying situation, as that many devices could cause serious disruptions to businesses and people worldwide. There are anecdotal reports that some of these evil doers are attempting to bribe online service providers to pay them money not to launch an attack.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">There is an excellent briefing by Dr. Johannes Ullrich of the SANS Institute in the following YouTube clip. This is a little tech jargon heavy, so only watch if you are really interested in learning more about this attack.</span></p>
<p><iframe loading="lazy" title="ISC Briefing: Large DDoS Attack Against Dyn" width="500" height="281" src="https://www.youtube.com/embed/AsEzDXjyhG8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;">
<p>The post <a href="https://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/">Details emerge about the huge internet attack last Friday.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Have you any smart internet connected IoT devices in your home?</title>
		<link>https://www.l2cybersecurity.com/iot-devices-hacked/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 29 Sep 2016 14:57:12 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Password]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=480</guid>

					<description><![CDATA[<p>If so, you may be an unwilling accomplice to the evil doers who are attempting to disrupt the internet. Do you have any one or more of the following Internet of Things &#8211; IoT devices which you can access from outside the home, over the internet: Security Cameras or Digital Video Recorders (DVRs) Baby monitor&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/iot-devices-hacked/">Have you any smart internet connected IoT devices in your home?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://1.bp.blogspot.com/-nX96JSTK0_Q/V-0k15-bozI/AAAAAAAAAas/JusheU45vDUA7i5xbqbQineyimHbsPOEQCLcB/s1600/IoT%2BDevices.jpg" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-nX96JSTK0_Q/V-0k15-bozI/AAAAAAAAAas/JusheU45vDUA7i5xbqbQineyimHbsPOEQCLcB/s320/IoT%2BDevices.jpg" alt="IoT Devices hacked" width="320" height="237" border="0" /></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If so, you may be an unwilling accomplice to the evil doers who are attempting to disrupt the internet.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Do you have any one or more of the following Internet of Things &#8211; IoT devices which you can access from outside the home, over the internet:</span></p>
</div>
<ul>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Security Cameras or Digital Video Recorders (DVRs)</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Baby monitor</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Smart sockets</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Smart light bulbs</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Smart Thermostat</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Energy usage monitor</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Smart fridge</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Media Server</span></li>
</ul>
<p><span id="more-480"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">All of these IoT devices should have a password on them to secure them from unwanted access. However, if you have not changed the default password, or the device has a hard coded password (which cannot be changed), then it is a trivial matter for the bad guys, who have tools that are constantly scanning the internet for such IoT devices, to find and take control of your device(s) without you even realising it.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: verdana, sans-serif;">They mainly do this to make use of it&#8217;s connected capabilities, though there have been other disturbing stories (more on this later). Just last week a new record was set for the biggest </span><a href="https://en.wikipedia.org/wiki/Denial-of-service_attack" data-blogger-escaped-style="font-family: verdana, sans-serif;">Distributed Denial of Service</a><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: verdana, sans-serif;"> (DDOS) attack:</span></p>
</div>
<blockquote class="tr_bq" data-blogger-escaped-style="text-align: justify;"><p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Octave Klaba, the founder and CTO of French hosting company OVH, sounded the alarm on Twitter on the 22nd September when his company was hit with two concurrent DDoS attacks whose combined bandwidth reached almost 1 terabit per second. One of the two attacks peaked at 799 gigabits per second alone, making it the largest ever reported.</span></p></blockquote>
<blockquote class="tr_bq" data-blogger-escaped-style="text-align: justify;"><p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">According to Klaba, the attack targeted Minecraft servers hosted on OVH&#8217;s network, and the source of the junk traffic was a <a href="https://en.wikipedia.org/wiki/Botnet">botnet</a> made up of 145,607 hacked digital video recorders and IP cameras.</span></p></blockquote>
<blockquote class="tr_bq" data-blogger-escaped-style="text-align: justify;"><p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">With the ability to generate traffic of between 1 </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">megabit per second</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"> and 30 </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">megabits per second</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"> from every single device, this botnet is able to launch DDoS attacks that exceed 1.5 terabits per second, Klaba warned.</span></p></blockquote>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Let&#8217;s put that figure of 1 terabit per second into perspective. If you are an eir or Vodafone Broadband customer, you will have a package that can be up to 70 or 100 megabits per second. If you are a Virgin Media customer, you will have a package that would be up to 240 or 360 megabits per second. So these are megabits.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">A gigabit is 1 thousand megabits. A terabit is 1 MILLION megabits! That is a LOT of crap data to be throwing at some servers that are designed to handle a fraction of that.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">And the source of this crap data &#8230; nearly 146,000 digital video recorders and IP cameras that have been taken control of by the criminals.</span> Probably because nobody changed the default password and they opened access to the devices to the internet. They were then instructed to constantly send gibberish data at specific servers that the evil doers wanted to disrupt.</p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">As for the other more disturbing stories, <a href="http://sfglobe.com/2016/01/06/stranger-hacks-familys-baby-monitor-and-talks-to-child-at-night/">here</a> is one about parents of a 3 year old boy discovering that some stranger had hacked into their baby monitor and was watching the night-vision video feed and talking to their child via the in-built speakers.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So the moral of the story is &#8211; put a password on every device that you have that connects to the internet in some way and disable/change any built-in accounts.</span> If you take the <a href="http://www.l2cybersecurity.com/#ourservices">Using the Internet Safely</a> training from L2 Cyber Security Solutions, then you will see how easy it is to create unique and strong passwords for all sites and applications.</p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/iot-devices-hacked/">Have you any smart internet connected IoT devices in your home?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
