• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

“Hinata” Botnet Could Launch Massive DDoS Attacks

You are here: Home / General Cyber Security News / “Hinata” Botnet Could Launch Massive DDoS Attacks
March 20, 2023

Scientists have uncovered a new DDoS botnet capable of launching attacks with data volumes achieving several Tbps.

Akamai reported the malware by itself was christened “Hinata” by its writer just after a character from the Naruto anime collection. The security vendor identified evidence of the “HinataBot” in its HTTP and SSH honeypots and said it is staying actively current by its authors.

When past variations introduced DDoS flooding attacks about several protocols, the latest HinataBot iteration works by using just HTTP and UDP flooding methods.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The actors at the rear of HinataBot at first dispersed Mirai binaries, and there are numerous nods to the infamous open up supply botnet in this new Go-based mostly effort and hard work, Akamai stated.

Read extra on Mirai: Mirai Gears Up For Business Attacks.

“HinataBot is the latest in the ever-escalating record of rising Go-based threats that incorporates botnets these types of as GoBruteForcer and the just lately identified (by SIRT) kmsdbot,” it spelled out.

“Go has been leveraged by attackers to enjoy the benefits of its large overall performance, ease of multi-threading, its a number of architecture and running method cross-compilation assist, but also probably simply because it adds complexity when compiled, increasing the issues of reverse engineering the ensuing binaries.”

The vendor claimed that, although packet size for HTTP ranged amongst 484 and 589 bytes, UDP packets have been notably much larger at 65,549 bytes.

Akamai developed its possess command-and-manage (C2) infrastructure and ran simulated attacks.

“Using our 10-second sample sets and a theorized measurement of the botnet, we can begin estimating attack sizing,” it reported.

“If the botnet contained just 1000 nodes, the ensuing UDP flood would weigh in at all around 336 Gbps per second. With 10,000 nodes (approximately 6.9% of the dimensions of Mirai at its peak), the UDP flood would weigh in at far more than 3.3 Tbps. The HTTP flood at 1000 nodes would create approximately 2.7 Gbps and far more than 2 Mrps. With 10,000 nodes, those people numbers bounce to 27 Gbps delivering 20.4 Mrps.”

The botnet grows by obtaining and exploiting outdated vulnerabilities and brute-forcing weak passwords, reinforcing the need for businesses to create cyber-cleanliness into their security tactics.


Some areas of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «researchers shed light on catb ransomware's evasion techniques Researchers Shed Light on CatB Ransomware’s Evasion Techniques
Next Post: New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply Chain Breaches new cyber platform lab 1 decodes dark web data to»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.