Frick
Fishfaced Nincompoop
- Joined
- Feb 27, 2006
- Messages
- 18,930 (2.85/day)
- Location
- Piteå
System Name | Black MC in Tokyo |
---|---|
Processor | Ryzen 5 5600 |
Motherboard | Asrock B450M-HDV |
Cooling | Be Quiet! Pure Rock 2 |
Memory | 2 x 16GB Kingston Fury 3400mhz |
Video Card(s) | XFX 6950XT Speedster MERC 319 |
Storage | Kingston A400 240GB | WD Black SN750 2TB |WD Blue 1TB x 2 | Toshiba P300 2TB | Seagate Expansion 8TB |
Display(s) | Samsung U32J590U 4K + BenQ GL2450HT 1080p |
Case | Fractal Design Define R4 |
Audio Device(s) | Line6 UX1 + some headphones, Nektar SE61 keyboard |
Power Supply | Corsair RM850x v3 |
Mouse | Logitech G602 |
Keyboard | Cherry MX Board 1.0 TKL Brown |
VR HMD | Acer Mixed Reality Headset |
Software | Windows 10 Pro |
Benchmark Scores | Rimworld 4K ready! |
https://blog.sucuri.net/2016/06/large-cctv-botnet-leveraged-ddos-attacks.html
Sources:
Hih-larious!
It all started with a small brick and mortar jewelry shop that signed up with us to help protect their site from a DDoS that had taken them down for days. By switching their DNS to the Sucuri Network, we were able to quickly mitigate the attack for them. It was a layer 7 attack (HTTP Flood) generating close to 35,000 HTTP requests per second(RPS) which was more than their web servers could handle.
Normally, this would be the end of the story. The attack would be mitigated, the attackers would move on after a few hours, and the website owner would be happy. In this case however, after the site came back up, the attacks increased their intensity, peaking to almost 50,000 HTTP requests per second. It continued for hours, which turned into days.
Since this type of long-duration DDoS is not so common, we decided to dive into what the attackers were doing, and to our surprise, they were leveraging only IoT (Internet of Things) CCTV devices as the source of their attack botnet.
Sources:
Hih-larious!