Casa > cibernético Notícias > CCTV Botnet Performing Layer 7 DDoS ataca empresas globais

Camada de execução de botnet CCTV 7 DDoS ataca empresas globais


A very intriguing and intensive DDoS/botnet attack has been just investigated by security researchers at US security vendor Sucuri. The botnet in question comprises of more than 25,000 bots targeting businesses at a global level. Mais especificamente, it’s a Layer 7 DDoS attack that engulfs web servers and crashes their websites. The attacks continued for days. The more researchers dived into their analysis, the more curious details they found.

As we extracted the geo-location from the IP addresses generating the DDoS, we noticed that they were coming from all over the world, different countries and networks. Um total de 25,513 unique IP addresses came within a couple of hours.

What Did Sucuri Researchers Discover About the Attacks?

A pesquisa indicates that the botnet consists of compromised international CCTV systems situated in various locations around the globe. The first collision Sucuri had with the botnet happened when a jewelry shop was put through a continuous DDoS attack. The business’s website was moved behind Sucuri’s WAF (Application Firewall Web).
Contudo, things didn’t end there, as the attacks continued. Como já dissemos, the initial attack was a Layer 7 DDoS one (Com mais de 35,000 HTTP requests per second). Attacker quickly noticed the WAF protection and speeded things up to 50,000 requests/ second.

The source of the attack concentrated in Taiwan, com 24% of the IP address, followed by the USA with 12%, Indonesia with 9%, Mexico with 8% and Malaysia with 6%. O topo 10 countries with the most compromised CCTV devices used in this attack were: Taiwan, EUA, Indonésia, México, Malásia, Israel, Itália, Vietnã, França.

IoT Botnet Leveraging CCTVs?

As the research went deeper into the IP addresses, it became clear that all of them were running the Cross Web Server, and all had a similar default HTTP page, containing a DVR Components title. This is when researchers came to realize that they were most likely dealing with an IoT botnet leveraging CCTVs as part of the attack vector. Mais longe, they uncovered the company logos from the resellers and manufactures on all of the IP addresses.


Sucuri believes that all of the devices are associated with RSA security researcher Rotem Kerner Rotem Kerner’s investigation that discovered a backdoor in the firmware of 70 CCTV DVR vendors.

Sucuri is currently in the process of contacting the networks that use the compromised cameras. Contudo, even when affected cameras are patched, attackers can easily find other devices to include in their botnets. That’s why companies should think of adequate DDoS protection.

Milena Dimitrova

Milena Dimitrova

Um escritor inspirado e gerente de conteúdo que está com SensorsTechForum desde o início do projeto. Um profissional com 10+ anos de experiência na criação de conteúdo envolvente. Focada na privacidade do usuário e desenvolvimento de malware, ela acredita fortemente em um mundo onde a segurança cibernética desempenha um papel central. Se o senso comum não faz sentido, ela vai estar lá para tomar notas. Essas notas podem mais tarde se transformar em artigos! Siga Milena @Milenyim

mais Posts

Me siga:

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

Compartilhar no Facebook Compartilhar
Compartilhar no Twitter chilrear
Compartilhar no Google Plus Compartilhar
Partilhar no Linkedin Compartilhar
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Partilhar no StumbleUpon Compartilhar