Malware & Threats

Cloud Server Abuse Leads to Huge Spike in Botnet Scanning

Netscout sees over one million IPs conducting reconnaissance scanning on the web due to increase in use of cheap or free cloud servers.

Netscout sees over one million IPs conducting reconnaissance scanning on the web due to increase in use of cheap or free cloud servers.

Malicious actors are increasingly abusing free cloud services, which has led to a significant spike in botnet scanning activity, according to performance and security solutions provider Netscout. 

Netscout typically sees 10,000-20,000 IP addresses conducting internet scans every day. However, the company observed an increase to more than 35,000 devices on December 8 and another spike that reached 43,000 devices on December 20. 

The number of source IPs associated with scanning activity saw a sharp increase on several days since, peaking on January 5, with nearly 1.3 million IPs. A majority of the IPs are associated with the US, China, Vietnam, Taiwan and Russia, Netscout reported.

“Analysis of the activity has uncovered a rise in the use of cheap or free cloud and hosting servers that attackers are using to create botnet launch pads. These servers are used via trials, free accounts, or low-cost accounts, which provide anonymity and minimal overhead to maintain,” the company explained in a blog post.

Netscout believes the scanning represents reconnaissance activity, with hackers using these new botnets to find vulnerabilities they can exploit.

The most commonly targeted ports are associated with HTTP, HTTPS, RDP, SIP, and other types of web servers, and there has also been an increase in scanning for email servers.

“The unprecedented growth of malicious botnets in the cloud confirms that a dangerous new wave of cybercrime is underway. This battle is just beginning and the adversary is performing reconnaissance to uncover areas to exploit,” Netscout said.

Related: Mysterious Malware Uses Wi-Fi Scanning to Get Location of Infected Device

Related: Mozi Botnet Likely Killed by Its Creators

Advertisement. Scroll to continue reading.

Related: Multiple DDoS Botnets Exploiting Recent Zyxel Vulnerability

Related Content

IoT Security

Malware hunters sound an alarm after discovering a 40,000-strong botnet packed with end-of-life routers and IoT devices being used in cybercriminal activities.

Malware & Threats

The US government says Russia’s APT28 group compromised Ubiquiti EdgeRouters to run cyberespionage operations worldwide.

IoT Security

Three million electric toothbrushes were reportedly used for disruptive DDoS attacks, but cybersecurity experts questioned the claims.

Malware & Threats

Akamai flags six zero-day vulnerabilities in Hitron DVRs exploited to ensnare devices in the InfectedSlurs botnet.

Malware & Threats

CISA released ICS advisories for FXC router and QNAP NRV flaws and added them to its known exploited vulnerabilities catalog. 

IoT Security

Every asset in an organization’s inventory that is not accounted for and protected is a potential attack vector that an attacker can use to...

Cybercrime

The top five categories of Bad Bot attacks are fake account creation, account takeovers, scraping, account management, and in-product abuse.

Malware & Threats

US government announces the takedown of the IPStorm proxy service botnet and the guilty plea of its creator, a Russian/Moldovan national.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version