123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Android Based Botnet Launches Ddos Attacks

Profile Picture
By Author: Jason Robertson
Total Articles: 1
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

A multitude of Android devices was being used to launch the attack to the targeted victims through malicious applications on the devices that are running in the background and is programmed to create DDoS traffic.

The earliest signs of attacks

It was on the 2nd of August when the first signs of WireX botnet attack came, but it went on unnoticed at that time. It was only discovered when researchers began analyzing logs and then looked for the 26 character User-Agent string within the logs. Most likely during that stage, it was in the early stages of its development due to its minimal effects.

Why should we be troubled?

Website owners should be worried because those in control of the botnet now have the capability to take down several large websites – putting junk traffic to it and then by consuming too much bandwidth, the website’s pages and services will go down. One should be very conscious about website malware attacks and it’s available protection. Too bad it was used for evil purposes such as causing bad publicity and disruption of legitimate services.

How it attacks

WireX ...
... uses the application layer of apps to launch attacks, being able to harness massive force depending on the number of Android devices it has already affected.

Majority of the affected applications were easily downloaded from Google Play Store, there were over 300 applications reportedly discovered which carries the malware launching the botnet through the apps. The botnet starts a background process on the affected Android device that would seem to launch an unseen browser and emulate series of endless legitimate browsing activities that would look like a human being has done it. The traffic mainly generated by the attack nodes is by HTTP (get) requests, however, there are some variants that was capable of issuing POST requests.

Google removed the discovered apps from the Play Store as soon as they got the report of the incidents, and currently, they are working on removing the apps from the phones of the affected Android devices.

To anyone who suffered a DDoS Attack you may want to verify the following pattern of User-Agent series if it was WireX botnet:

User-Agent: jigpuzbcomkenhvladtwysqfxr

User-Agent: yudjmikcvzoqwsbflghtxpanre

User-Agent: mckvhaflwzbderiysoguxnqtpj

User-Agent: deogjvtynmcxzwfsbahirukqpl

User-Agent: fdmjczoeyarnuqkbgtlivsxhwp

User-Agent: yczfxlrenuqtwmavhojpigkdsb

User-Agent: dnlseufokcgvmajqzpbtrwyxih

What can be done during an attack?

It ought not to be the matter of amazement and stun when even your affirmation saying yes on anything can hurt you. We saw new sort of Voice Phishing and its conceivable outcomes. Security professionals should gather data and metrics and then share it. With the information gathered, experts and those who have the means to counter it can learn much more about it.

Total Views: 382Word Count: 431See All articles From Author

Add Comment

Business Articles

1. Fitatoo Smile Eco Raglan Hoodie Sustainable Streetwear In The Uk
Author: Fitatoo

2. Bridging Knowledge Gaps In Hse Through Interactive E-learning
Author: Jane

3. Role Of Quick Lime In The Pulp And Paper Industry: Uses And Benefits
Author: Shaurya Minerals

4. Top 5 Mistakes Homeowners Make When Hiring A Builder In Chennai And How To Avoid Them
Author: bharathi

5. Bpo Projects For Startup Company: Grow With Zoetic Bpo Services
Author: mohan

6. Scorpio Technologies – The Leading Responsive Web Design Company In Chennai
Author: scorpiotechnologies

7. Scorpio Technologies: The Best Web Design Service In Chennai
Author: scorpiotechnologies

8. Latest Indo Western Dress – Elegant Fusion Fashion
Author: le concept

9. Top Logo Designer In Ahmedabad: Crafting Unique Brand Identities That Speak Volumes
Author: Kymin Creation

10. What Types Of Noise Barriers Are Used To Lessen Noise Pollution?
Author: O'Neill Engineered Systems, Inc

11. Why Are Container Inspections Important For Safety?
Author: TIC

12. 10 Essential Tips For During Production Inspection
Author: TIC

13. What Is A Pre Production Inspection And Why Is It Important?
Author: TIC

14. How Does Quality Inspection Impact Product Quality?
Author: TIC

15. 8 Benefits Of Regular Quality Inspections
Author: TIC

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: