Dutch police take down hornets’ nest of DDoS botnets

Forums Security News (Security) Dutch police take down hornets’ nest of DDoS botnets

Tagged: 

  • This topic has 1 voice and 0 replies.
Viewing 0 reply threads
  • Author
    Posts
    • #36842
      Telegram SmartBoT
      Moderator
      • Topic 5959
      • Replies 0
      • posts 5959
        @tgsmartbot

        #News(Security) [ via IoTGroup ]


        Headings…
        Dutch police take down hornets’ nest of DDoS botnets
        KV hosted all sorts of botnets
        KV hosted DDoS booter services
        KV never took action against bad customers
        Two arrested
        Related Topics:

        Auto extracted Text……

        Dutch police have taken down  a bulletproof hosting provider that has sheltered tens of IoT botnets that have been responsible for hundreds of thousands of DDoS attacks around the world, has learned.
        Servers were seized, and two men were arrested yesterday at the offices of KV Solutions BV (KV hereinafter), a so-called bulletproof hosting provider, a term used to describe web hosting providers that ignore abuse reports and allow cybercrime operations to operate on their servers.
        But above all, the company has made a reputation in cyber-security circles for being a hotspot for DDoS botnets, with cyber-criminals renting KV servers to host their bot scanners, malware, and command-and-control (C&C) servers, knowing they’d be safe from “harm.”
        This year alone, KV hosted tens of these DDoS botnets, most of which have been compiled in this Twitter mega-thread by threat intelligence firm Bad Packets LLC.
        The botnets have been created using so-called “IoT malware,” which is malware designed to infect Linux-based operating systems that run on routers and other “smart” (Internet of Things) devices.
        In an interview with ZDNet, Bad Packets said the botnets operating from KV’s infrastructure had been observed in the past year scanning the internet and looking to infect a wide range of devices, such as:
        While the vast majority of DDoS botnets operating on KV’s infrastructure had been seen running a version of the Mirai IoT malware, the hosting firm has also harbored botnets built with all sorts of other IoT malware, encompassing almost all IoT malware variants seen in the past year:
        Furthermore, KV also served as a hosting provider for some botnets that were part of DDoS-for-hire (DDoS booter) services, according to Troy Mursch, co-founder of Bad Packets.
        Victims of DDoS attacks that originated from KV-hosted botnets include Ubisoft, Wish


        Read More..
        AutoTextExtraction by Working BoT using SmartNews 1.0299999999 Build 26 Aug 2019

    Viewing 0 reply threads
    • You must be logged in to reply to this topic.