Friday , October 20 2017 8:46 AM
Home / Cyber Attacks / DDoS Attack / Launching 20 DDoS Attacks/Day at 150Gbps

Launching 20 DDoS Attacks/Day at 150Gbps

Launching 20 DDoS Attacks/Day at 150Gbps 1 Launching 20 DDoS Attacks/Day at 150Gbps
A network of compromised Linux servers has grown so powerful that it can blow large websites off the Internet by launching crippling Distributed Denial-of-service (DDoS) attacks of over 150 gigabits per second (Gbps).
The distributed denial-of-service network, dubbed XOR DDoS Botnet, targets over 20 websites per day, according to an advisory published by content delivery firm Akamai Technologies.
Over 90 percent of the XOR DDoS targets are located in Asia, and the most frequent targets are the gaming sector and educational institutions.
XOR creator is supposed to be from China, citing the fact that the IP addresses of all Command and Control (C&C) servers of XOR are located in Asia, where most of the infected Linux machines also reside.

How XOR DDoS Botnet infects Linux System?

Unlike other DDoS botnets, the XOR DDoS botnet infects Linux machines via embedded devices such as network routers and then brute forces a machine’s SSH service to gain root access to targeted machines.
Once the attackers have acquired Secure Shell credentials and logged in, they use root privileges to run a simple shell script that secretly downloads and installs the malicious XOR botnet software.
However, there is no such evidence that XOR DDoS infects computers by exploiting flaws in the Linux operating system itself.

A High-Bandwidth DDoS Attack

Akamai’s Security Intelligence Response Team (SIRT) has seen DDoS attacks – SYN and DNS floods as the observed attack vectors – with the bandwidth ranging from a few gigabits per second (Gbps) tonearly 179 Gbps.
The upper figure is a massive DDoS attack volume that even most multinational corporate networks can not handle. However, the biggest recorded DDoS attacks have hit 400 Gbps.

How to Detect and Mitigate XOR DDoS Botnet?

Akamai’s advisory outlines two different methods for detecting the recent version of the XOR malware.
  1. To Detect XOR DDoS Botnet in your Network, look for the communications between a bot and its C&C server, using the Snort rule given in the advisory.
  2. To Detect XOR DDoS Botnet infection on your Hosts, use the YARA rule also shown in the advisory.
Moreover, Akamai also provides a four-step process for removing the XOR DDoS Trojan from your machine, as given below:
  1. First, identify the malicious files in two directories (/boot and /etc/init.d)
  2. Identify the supporting processes responsible for the persistence of the main process
  3. Kill the malicious processes
  4. Delete the malicious files (in /boot and /etc/init.d)
Additionally, disabling system root login from SSH (Secure Shell), or using a strong password will also defeat this issue.

About GOPU

Technology Enthusiast with a keen eye on the Cyber-security and other tech related developments.

Powered by themekiller.com anime4online.com animextoon.com apk4phone.com tengag.com moviekillers.com