An after-discovered network botetet consisting of an estimated 30,000 webcam and video recorders-with the largest concentration in the US-has delivered the biggest attack on the denial of the service ever seen, a safety researcher in Nokia said.
The Botnet, detected under the name Eleven11bot, only came to light at the end of February when researchers in Nokia’s Deepfield Emergency Response team observed a large number of geographically distributed IP addresses that deliver “hyper-volumetric attacks”. Eleven11bot has since produced large -scale attacks.
Volumetric DDoss concludes services by consuming all available bandwidth in the targeted network or the connection to the Internet. This approach works differently than exhaustion DDoss, which exerts the computer sources of a server too much. Hypervolumetric seizures are volumetric doses that provide incredible amounts of data, usually measured in the terabits per second.
Johnny-Come has set Botnet a new record
At 30,000 devices, the eleven1bot was already exceptionally large (although some bot nets exceeded 100,000 devices). Most of the IP addresses participating, Nokia researcher Jérôme Meyer told me, has never seen what was involved in DDos attacks.
In addition to a 30,000 node that looks overnight, another important feature of eleven1bot is the record -sized volume of data it sends its targets. The largest one that Nokia has seen from eleven1bot so far took place on February 27, reaching a peak at approximately 6.5 terabits per second. The previous record for a volumetric attack was reported at 5.6 TBPS in January.
“Eleven11Bot has targeted various sectors, including communications service providers and games host to infrastructure, which utilizes a variety of attack vectors,” Meyer wrote. Although the attacks are in some cases based on the amount of data, others focus on flooding a connection to more data packs than a connection can handle, with numbers ranging from a ‘few hundred thousand to a few hundred million packets per second’. The decline of the service caused in some attacks lasted several days, and some continued from the time this post was direct.
A distribution showed that the largest concentration of IP addresses, at 24.4 percent, was located in the US. Taiwan was at 17.7 percent next, and the UK with 6.5 percent.
In an online interview, Meyer made the following points: