Picture of theregister.co.uk

As we say… .. The future (Mirai malware)

Surely all of us have now heard terms such as bot-net, malware, computer viruses, etc. We at iguru ook a few times have written articles on ways to prevent, or even category analyzes and more specialized ways to deal with computer threats.

mirai
Picture of theregister.co.uk

This article is dedicated to a specific regular hacking that we have been listening to since last September and unfortunately we will continue to hear it in the future. This tactic is known as Attack Dos or DDos and the average user can not cope with antivirus now.

What is Dos and what DDos?Mirai malware

In a DoS attack, the attacker causes the IP address of the target device to be congested, with external, unnecessary communication requests constantly sending requests from the attacker to the server to keep it busy, making it impossible or time consuming to connect the device to the Internet. The attack is directed at the IP address of the target device.

The above can be done very easily from any terminal.

In contrast, in a DDoS attack, the attacker κακόβουλο λογισμικό που εγκαθίσταται σε πολλούς υπολογιστές προκειμένου να εντοπίσουν και να επιτεθούν στη στοχευόμενη συσκευή. Οι εισβολείς που ξεκινούν μια επίθεση DDoS επιλέγουν αυτό το είδος επίθεσης για να επιτύχουν μεγαλύτερο πλήγμα στη στοχευόμενη συσκευή σε σχέση με μια επίθεση DoS που ξεκινά από μία μόνο συσκευή.

How can I know if I'm attacking?

If your device is being attacked by DoS or DDoS, you may not be able to connect to the Internet or the device being attacked will be disconnected. The goal in a few words of this particular way of attack is blackout.

What is the IoT we are listening to over the last few months and what role does it play in DDos attacks?

Mirai malware

Internet of (IoT), is a new term coined with Kevin Ashton, co-founder and executive director of the Auto-ID Center (an MIT research consortium), during a Procter & Gamble presentation. As "things" he referred to objects that are now capable of being connected and shared over the network, whether they are sports shoes that count time and steps, whether they are decoders, routers, or medicine boxes that remind patients to take their medicine, etc.

In the vision of the Internet of Things, objects create a diffuse system and are interconnected using multiple (usually small) communication technologies. RFID tags are one of the first examples in this field. However, over time, this has led to new technologies that make communication between objects more efficient. The IEEE 802.15.4 standard stands out among them and the recent modification of IEEE 802.15.4e can significantly increase the reliability of radio frequency connections and energy efficiency, thanks to the adoption of the mechanism s.

Mirai malware.mirai

"Mirai” which in Japanese means “the future”, is the name given to the malware specifically designed to infect IoT devices, which on September 20 last took part in one of the largest DDos attacks ever. Some of the targets were Twitter, GitHub, Reddit, Netflix, Airbnb and many others such as the French provider OVH. And also a configuration of this particular malware was yesterday's almost successful attack on Deutsche Telecom.

Malware was designed to infect Linux systems and synchronize the attack.

Finally is open source safe?Mirai malware

One of the questions that immediately comes to my mind is this.. We keep hearing about her that provides Linux with its Kernel, and surely anyone who frequents online forums for Linux enthusiasts will surely have read the saying "Linux has no viruses" at least once! The above confirms my own opinion that "no one deals with Linux" and if they decide to deal with it, here are the results. And Linux isn't just about Ubuntu! Linux is also running on the router we are currently connecting to the internet from our house!

The evil of the case is that each of us can with basic knowledge find the source code, format it, adapt it to a device and set up an IoT! A smart toaster that reminds you of your decadence with a message on the cell phone! If I can synchronize a large number of such totes to transmit data at once, I can create big problems in a whole country! Made of tape like that? And yet we've already experienced it!

Do we need to set some security terms and protocols to use open source?

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).