albertynos Posted September 26, 2016 Report Posted September 26, 2016 (edited) The hosting company OVH was the victim of a 1 Tbps DDoS attack that hit its servers, this is the largest one ever seen on the Internet. The hosting provider OVH faced 1Tbps DDoS attack last week, likely the largest offensive ever seen. The OVH founder and CTO Octave Klaba reported the 1Tbps DDoS attack on Twitter sharing an image that lists the multiple sources of the attack. Klaba explained that the servers of its company were hit by multiple attacks exceeding 100 Gbps simultaneously concurring at 1 Tbps DDoS attack. The severest single attack that was documented by OVH reached 93 MMps and 799 Gbps. One of the attacks documented by the OVH reached 93 MMps and 799 Gbps. According to Klaba, the attackers used an IoT botnet composed also of compromised CCTV cameras. Unfortunately, this is not a novelty, in June 2016 security experts from Sucuri firm have discovered a large botnet of compromised CCTV devices used by crooks to launch DDoS attacks in the wild. Earlier this week, the website of the popular cyber security expert Brian Krebs was targeted by a DDoS attack of 665 Gbps. Experts speculate the attackers hit Krebs in response to his blog post in which he exposed a the operators behind the vDOS DDoS service. IoT devices, including CCTV, often lack proper configuration, it is easy for hackers to locate on the Internet systems with weak or default login credentials. Recently security experts reported several Linux malware targeting IoT devices such as Luabot and Bashlite. Earlier September, experts from Level 3 and Flashpoint confirmed the overall number of devices infected by the BASHLITE malware is more than 1 million. The number includes compromised devices belonging to several botnets, according to the experts, almost every infected device are digital video recorders (DVRs) or cameras (95%), the remaining is composed of routers (4%), and Linux servers (1%). “Of the identifiable devices participating in these botnets, almost 96 percent were IoT devices (of which 95 percent were cameras and DVRs), roughly 4 percent were home routers and less than 1 percent were compromised Linux servers. This represents a drastic shift in the composition of botnets compared to the compromised server- and home router-based DDoS botnets we’ve seen in the past.” states a blog post published by Level 3 firm. The researchers have been tracking more than 200 C&C worldwide used by the BASHLITE botnets. Fortunately, the IP addresses of the C&C servers were found hardcoded in the instance of malware detected in the wild making easy for experts to shut them down. Back to the case of the 1Tbps DDoS attack against the OVH firms, at the time I was writing the servers were back online. Source : http://securityaffairs.co/wordpress/51640/cyber-crime/tbps-ddos-attack.html Edited September 26, 2016 by albertynos 2 Quote
imthelaw Posted September 26, 2016 Report Posted September 26, 2016 si cand te gandesti ca poate uni detin sute de servere ... cu Putere nu gluma ... 1 TB chiar mi se pare o joaca de kidzi 1 Quote
AGSQ Posted September 26, 2016 Report Posted September 26, 2016 (edited) Largest atack pe pula mea .... a fost in 2012 un atac din China catre un ISP (al carui nume imi scapa) care ajunsese la cateva sute de Tbps. Edited September 26, 2016 by AGSQ 1 Quote
aelius Posted September 26, 2016 Report Posted September 26, 2016 13 minutes ago, AGSQ said: Largest atack pe pula mea .... a fost in 2012 un atac din China catre un ISP (al carui nume imi scapa) care ajunsese la cateva sute de Tbps. Au fost vreo 200gbps man. Atacurile de +500gbps au inceput decand cu dns/ntp amplification. Si vezi ca e tcp ack, deci nu e low profile attack. Deci cine a trimis, e profesionist 1 Quote
albertynos Posted September 26, 2016 Author Report Posted September 26, 2016 Alo e tcp ack cum sa fie joaca? 1 Quote
Taaz Posted September 26, 2016 Report Posted September 26, 2016 (edited) Actually, chiar e o joaca, oricine cu 200-500$ poate avea acces la asa ceva. Cumperi fisierele codate cum trebuie pentru selfreping si fiecare IoT prins scaneaza si infecteaza singur alte dispozitive. Asa se ajunge la atacuri de sute de gbs de cand cu renumitul "qbot". Cam asa arata unul din sutele de variante de fisiere executate pe IoT http://pastebin.com/raw/xQWdg4Uq Edited September 26, 2016 by Taaz 2 Quote
imthelaw Posted September 26, 2016 Report Posted September 26, 2016 The number includes compromised devices belonging to several botnets, according to the experts, almost every infected device are digital video recorders (DVRs) or cameras (95%), the remaining is composed of routers (4%), and Linux servers (1%). deci eu vb de Masinutze ... nu de Acest Pro "cur" ca solcanu digital video recorders (DVRs) or cameras (95%) hai ma ... sunt tone de default ptr asa ceva ... intro ora iei cateva sute si rezolvi cazul ... WTF ? chiar asa de PRO e this PRO CUR eu nu cred ... chiar nu cred ... din amintiri din copilarie .. stiu ca am facut o incercare ... cu Mainul .tk si i-am aplicat una de 2 zile .. sau rupt in masele ...am folosit un sg serv de .jp aveam de asemeni boala pe apropo.ro .. si chatul lor de kkt .. iar .. au plans cu vb .. same server .jp .... DECI sa fi PRO .. nu ai fi dat in ei Un PRO nu face chestiuni de genul asta Just opinia mea de Tranta Quote
.Breacker Posted September 26, 2016 Report Posted September 26, 2016 Când se juca kronzy cu ddos voi erati copiii mici. Quote