Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

NETSCOUT reveals the effect of remote working on online attacks

October 2020 by NETSCOUT

As a result of the COVID-19 pandemic, working from home suddenly became the norm and with it came an overnight increase in the use of personal laptops, home routers and other consumer devices. NETSCOUT’s recently released Threat Intelligence Report has analysed the effect that this had on online attacks.

Malicious authors continued their impressively efficient efforts to syphon in the latest IoT exploits and churn out new Mirai-based variants. However, while Mirai variants are the most dominant IoT bots seen on the internet today, several non-Mirai IoT malware are also causing a ruckus. One such example is Gafgyt, a multi-architecture IoT bot with several similarities to Mirai.

Gafgyt has used telnet with default/factory credentials and exploits to spread to vulnerable IoT devices. Like Mirai, Gafgyt supports several TCP, UDP, and HTTP based DDoS attacks. Gafgyt is continuously undergoing development with new exploits and credentials, as shown by the numerous variants running wild on the internet. NETSCOUT saw a significant spike in Gafgyt samples from February through June, although January through February decreased compared with 2019.

It is likely that this spike was related to the sudden increase in consumer devices brought online as the remote work skyrocketed during that time frame. Indeed, during lockdown, the world was hit by the single largest number of monthly attacks NETSCOUT has ever seen—929,000 DDoS attacks in May alone.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts