• Редакција
  • Приватност
  • Услови за користење
  • Маркетинг
  • Контакт
Tech News, Magazine & Review WordPress Theme 2017
  • Насловна
    • Зошто ИТ-Безбедност.мк?
  • Хакерски Новости
    • Хакерски Напади
    • Сајбер Криминал
    • Ранливости
    • Малвери/Закани
  • Туторијали и Алатки
  • Кариера
  • Контакт
No Result
View All Result
  • Насловна
    • Зошто ИТ-Безбедност.мк?
  • Хакерски Новости
    • Хакерски Напади
    • Сајбер Криминал
    • Ранливости
    • Малвери/Закани
  • Туторијали и Алатки
  • Кариера
  • Контакт
No Result
View All Result
ИТ Безбедност
No Result
View All Result

Global DDoS Extorters Demand Ransom from Firms

Филип Симеонов by Филип Симеонов
септември 3, 2020
Home Хакерски Новости
Share on FacebookShare on Twitter

Security experts are warning of a new global DDoS-related extortion campaign targeting businesses operating in the e-commerce, finance and travel sectors.

Radware said it had been tracking the threat actors since mid-August, with victims in North America, APAC and EMEA. Emails are typically delivered claiming to come from state-sponsored groups such as Fancy Bear and Lazarus Group, as well as the  “Armada Collective.”

The latter group has been linked to similar extortion emails sent in previous years.

The ransom emails threaten to launch DDoS attacks against the recipient organization of over 2Tbps, if payment of anywhere between 10 and 20BTC ($113,000-226,000) is not made. They also threaten to increase the ransom by 10BTC for each deadline missed.

Also included in the messages are the Autonomous System Numbers (ASNs) or IP addresses of servers or services that the group says it will target if their demands are not met.

“In follow-up messages, threat actors underscore that the unique Bitcoin address from the initial letter is still empty and reiterate the seriousness of the threat. They also provide keywords and organization names so the target organization can search for recent DDoS disruptions, followed by the rhetorical question ‘You don’t want to be like them, do you?’,” Radware explained.

“In many cases the ransom threat is followed by cyber-attacks ranging from 50Gbps to 200Gbps. The attack vectors include UDP and UDP-Frag floods, some leveraging WS-Discovery amplification, combined with TCP SYN, TCP out-of-state, and ICMP Floods.”

Recipients of the emails were urged not to pay the ransom.

At the same time, Radware claimed to have observed multiple European ISPs being hit by DNS DDoS attacks since last week, although there’s no obvious link to the ransom campaign.

A group using the name “Armada Collective” tried a similar ransom ploy back in 2016, when Cloudflare claimed that it had heard from 100 customers who had received extortion threats and demands for payment of 10-50BTC.

Филип Симеонов

Филип Симеонов

Препорачани.

New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data

New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data

септември 3, 2020
Hackers are exploiting a critical flaw affecting >350,000 WordPress sites

Hackers are exploiting a critical flaw affecting >350,000 WordPress sites

септември 3, 2020

Популарно.

New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data

New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data

септември 3, 2020
Global DDoS Extorters Demand Ransom from Firms

Global DDoS Extorters Demand Ransom from Firms

септември 3, 2020
Зошто ИТ-Безбедност.мк?

Russian citizen arrested in the United States on charges of organizing a cyber crime

септември 1, 2020
Iranian Hackers Pose as Journalists to Trick Victims Into Installing Malware

Iranian Hackers Pose as Journalists to Trick Victims Into Installing Malware

септември 3, 2020
Ризикот од користење на ZOOM апликацијата во банкарскиот сектор

Ризикот од користење на ZOOM апликацијата во банкарскиот сектор

септември 1, 2020
ИТ Безбедност

Специјализирано место во кое можеш да дознаеш за сите новости и информации поврзани со Сајбер Безбедност и хакирањето.

Следете не

  • Редакција
  • Приватност
  • Услови за користење
  • Маркетинг
  • Контакт

© 2020 ИТ-Безбедност. Сите права се задржани.

No Result
View All Result
  • Home

© 2020 ИТ-Безбедност. Сите права се задржани.