Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Arbor Networks Examines DDoS Malware

Arbor Networks has been analyzing some of the malware used to launch DDoS attacks, in order to help educate organizations on the nature of code used to create and manage the DDoS botnets.

In a series of blog posts, Arbor Networks examines the operational abilities and design of the Armageddon, Khan, and PonyDOS botnets, or rather the malware that establishes them.

Arbor Networks has been analyzing some of the malware used to launch DDoS attacks, in order to help educate organizations on the nature of code used to create and manage the DDoS botnets.

In a series of blog posts, Arbor Networks examines the operational abilities and design of the Armageddon, Khan, and PonyDOS botnets, or rather the malware that establishes them.

Since the first version of the code was released some time ago, Armageddon has undergone several changes. At present, the bot uses new crypto to hide some of the new features from passive code breakers, which include the ability to launch various types of DDoS attacks, based on the nature of the target. There is the standard Apache flood, but also controls for websites driven by vBulletin or phpBB.

Khan is a botnet that has one purpose, DDoS attacks. It’s a straightforward bot that attempts to generate floods that look like legitimate traffic. If Khan is able to pull the attack off, mitigations become highly difficult.

White Paper: The Business Case for Managed DDoS Protection

“One of its techniques is to flood a victim with HTTP requests that appear to be crawler requests from search engines; this is presumably based on the quite reasonable expectation that the victim web sites will be terrified of filtering out web requests from such crawlers for fear of seriously impairing their page rankings at Google, Bing, etc., and thus becoming effectively invisible to potential customers,” Arbor’s Jeff Edwards wrote.

Pony on the other hand is newer, arriving on the Web in late 2011. Like the others, Pony is designed almost exclusively for DDoS attacks, using complicated encryption for communications.

“To date we’ve logged attacks against various target web sites hosted in the United States, Russian, and Luxembourg. The PonyDOS botmasters seem to favor the GET flood attacks, with almost half (94 out of 192 logged events) of its attacks being specified as attack code 0×01 (GET without server read) or 0×02 (GET with server read). TCP Connection Floods (code 0×00) and POST floods (code 0×03) were used less frequently,” Edwards added.

Advertisement. Scroll to continue reading.

Earlier this week, SecurityWeek contributor Adam Rice discussed creating a DDoS attack action plan, including some basics to get things started. You can view his thoughts here.

Register for DDoS Webcast

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.