WireX Android DDoS Malware Adds UDP Flood

blog / Sept 01, 2017 (MODIFIED: Oct 04, 2017)

by Julia Karpin, Liron Segal, Maxim Zavodchik

As quickly as attackers commandeer IoT devices to build more “thingbots,” they continue to evolve their attack types and functionality.

The Hunt for IoT: The Rise of Thingbots

report / Aug 09, 2017 (MODIFIED: Oct 17, 2017)

by Sara Boddy, Justin Shattuck

With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs are pointing to them becoming the attacker infrastructure of the future.

THE HUNT FOR IoT: The Networks Building Death Star-Sized Botnets

report / May 10, 2017 (MODIFIED: Aug 07, 2017)

by Sara Boddy, Justin Shattuck

With a growth rate of 1,473% in 2016, the hunt for vulnerable IoT devices rages on...

Old Protocols, New Exploits: LDAP Unwittingly Serves DDoS Amplification Attacks

article / Nov 15, 2016 (MODIFIED: Jul 06, 2017)

by Liron Segal

A new DDoS attack vector that leverages LDAP for reflection-amplification attacks is seeing increased usage.

DDoS's Newest Minions: IoT Devices (Volume 1)

report / Oct 08, 2016 (MODIFIED: Jul 06, 2017)

by Justin Shattuck, Sara Boddy

The latest evolution of cyber weapons is brought to you by the default passwords in Internet of Things (IoT) devices.

Mirai: The IoT Bot that Took Down Krebs and Launched a Tbps Attack on OVH

article / Oct 06, 2016 (MODIFIED: Jul 06, 2017)

by Liron Segal

The Mirai botnet has infected hundreds of thousands of Internet of Things (IoT) devices, specifically security cameras, by using vendor default passwords for Telnet access.

Are You Ready to Handle 100+ Gbps DDoS Attacks—the New Normal?

article / Jun 13, 2016 (MODIFIED: Jul 06, 2017)

by Ilan Meller

DDoS attacks have been common since the late 2000s, but average attack peaks have increased to 100+ Gbps.

Thanks to Anonymous' Latest Toolset, Anyone Can Play the DDoS Game

article / Jun 01, 2016 (MODIFIED: Jul 06, 2017)

by Liron Segal

Anonymous commoditizes well-known DDoS attacks by making easy-to-use tools, available to even the most unsophisticated user.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.