Categories: NewsSecurity

Updated Mirai Botnet Malware Executes 54-hour DDoS Attack

Botnets remain a very popular tool among cybercirminals these days. Ever since the Mirai botnet was introduced to the world, several variants have popped up in its wake. A new variant of this particular botnet malware has been discovered, which is capable of executing 54-hour DDoS attacks. It goes to show the initial Mirai botnet malware was just a sign of things to come, as the situation will only get worse from here on out.

Mirai Botnet Malware Becomes Even More Dangerous

It is not surprising to find out the Mirai botnet malware has undergone a major update. Since the source code was made public on the internet a while ago, developers all over the world have been busy analyzing the project. Some criminals have taken it upon themselves to make improvements to this source code. Unfortunately, this also means more botnet attacks will be executed in the future, which does not bode well by any means.

Speaking of which, someone used an updated Mirai malware client to attack a US College in February of 2017. This particular attack saw the US college facing a strong DDoS attack over a 54-hour timespan. This is quite a significant change from how the original botnet operated, as those attacks would usually only last for 24 hours. Extending such powerful distributed denial-of-service attacks to a 54-hour window is quite a significant development.

As one would expect, this particular Mirai botnet attack was made possible thanks to thousands of

Related Post
IoT devices getting hacked once again. All of these devices successfully flooded the intended target with HTTP traffic. It is believed nearly 10,000 CCTV cameras, routers, and DVRs were used to successfully execute this large-scale DDoS attack. Security experts also claim vendors of these devices failed to address the security vulnerabilities exposed by the original Mirai malware.

A multi-day direct denial-of-service attack is quite unusual, to say the least. Interestingly enough, this particular attack maintained a flow of 30,000 HTTP requests per second during the entire 54 hours of flooding the network. It is evident this is a big step up compared to the initial Mirai botnet attack, although it may only be a marginal improvement compared to what the future has in store. After all, there is no limit as to what criminals can do by using the Mirai malware code and making additional improvements.

One major change separates both Mirai malware types. The new variable contains 30-user agent alternatives, compared to only 5 found in the original botnet. A larger range of user agents allows the malware to circumvent any countermeasure put in place by engineers to mitigate these botnet attacks. Moreover, it appears there is a geographical chance as to where these attacks originate from as well. This particular attack included IP addresses originating from the US (18%), Israel (11%) and Taiwan (11%).

It is evident security researchers are quite concerned about this new development. Having a malware capable of executing large-scale, sustained, multi-day DDoS attacks is quite troublesome. If the people responsible for this US college attack find a way to keep improving and refining their tactics, things could take on cataclysmic proportions relatively quickly. Internet of Things device security remains a critical weakness that needs to be addressed sooner rather than later as well.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Quickex Expands Cryptocurrency Options with Over 200 Coins Available for Exchange

Quickex, a cutting-edge cryptocurrency exchange platform, announces a key milestone by enabling over 200 coins…

9 hours ago

EigenLayer Airdrop Attracts Legendary Trader GCR And Justin Sun’s Team

EigenLayer, the innovative blockchain project, has recently made headlines with its first season airdrop announcement,…

15 hours ago

Uniswap’s Latest Upgrade Allows Direct Purchases With Robinhood Balance

Uniswap, the leading decentralized exchange, has recently enhanced its functionality by integrating Robinhood Connect into…

15 hours ago

Anonymity vs. Transparency: BlockDAG’s Post-Forbes Dilemma

Anonymity vs. Transparency: Where Will BlockDAG Go After the Forbes Doxxing? The cryptocurrency market has…

16 hours ago

Top ICOs: BlockDAG, Dogeverse, 99BTC, WAI, eTukTuk & Others

Top 7 Crypto ICOs: BlockDAG’s Over $22M Presale Surge Outshines Dogeverse, 5thScape, WAI, 99BTC &…

22 hours ago

BlockDAG Revolution: Forbes Disclosure Propels It to New Heights

Forbes Disclosure Catalyzes BlockDAG Presale: Is This Crypto Innovation the Future or Just a Tech…

1 day ago