ALL >> Business >> View Article
Android Based Botnet Launches Ddos Attacks
A multitude of Android devices was being used to launch the attack to the targeted victims through malicious applications on the devices that are running in the background and is programmed to create DDoS traffic.
The earliest signs of attacks
It was on the 2nd of August when the first signs of WireX botnet attack came, but it went on unnoticed at that time. It was only discovered when researchers began analyzing logs and then looked for the 26 character User-Agent string within the logs. Most likely during that stage, it was in the early stages of its development due to its minimal effects.
Why should we be troubled?
Website owners should be worried because those in control of the botnet now have the capability to take down several large websites – putting junk traffic to it and then by consuming too much bandwidth, the website’s pages and services will go down. One should be very conscious about website malware attacks and it’s available protection. Too bad it was used for evil purposes such as causing bad publicity and disruption of legitimate services.
How it attacks
WireX ...
... uses the application layer of apps to launch attacks, being able to harness massive force depending on the number of Android devices it has already affected.
Majority of the affected applications were easily downloaded from Google Play Store, there were over 300 applications reportedly discovered which carries the malware launching the botnet through the apps. The botnet starts a background process on the affected Android device that would seem to launch an unseen browser and emulate series of endless legitimate browsing activities that would look like a human being has done it. The traffic mainly generated by the attack nodes is by HTTP (get) requests, however, there are some variants that was capable of issuing POST requests.
Google removed the discovered apps from the Play Store as soon as they got the report of the incidents, and currently, they are working on removing the apps from the phones of the affected Android devices.
To anyone who suffered a DDoS Attack you may want to verify the following pattern of User-Agent series if it was WireX botnet:
User-Agent: jigpuzbcomkenhvladtwysqfxr
User-Agent: yudjmikcvzoqwsbflghtxpanre
User-Agent: mckvhaflwzbderiysoguxnqtpj
User-Agent: deogjvtynmcxzwfsbahirukqpl
User-Agent: fdmjczoeyarnuqkbgtlivsxhwp
User-Agent: yczfxlrenuqtwmavhojpigkdsb
User-Agent: dnlseufokcgvmajqzpbtrwyxih
What can be done during an attack?
It ought not to be the matter of amazement and stun when even your affirmation saying yes on anything can hurt you. We saw new sort of Voice Phishing and its conceivable outcomes. Security professionals should gather data and metrics and then share it. With the information gathered, experts and those who have the means to counter it can learn much more about it.
Add Comment
Business Articles
1. Acoustics, Or The Study Of SoundAuthor: DSP Consultants
2. Famous Music Festivals In Western Canada: Where Sound And Scenery Collide
Author: Miles James
3. Popular Music Festivals In Western Canada: Where Sound Meets Scenery
Author: Miles James
4. Music Festivals British Columbia: Experience The Soundtrack Of British Columbia
Author: Miles James
5. Shine Your Brand Bright: Hire Led Advertising Screens And Mobile Led Vans In Birmingham
Author: Vikram kumar
6. Affordable Digital Marketing Company In Visakhapatnam For Startups And Small Businesses
Author: Digital Shout
7. Modern Balcony Railing Design And Designer Fencing Work In Hyderabad For Elegant Homes
Author: MA Fabrication
8. Enhance Safety And Style With Balcony Grill With Pigeon Protection In Hyderabad
Author: MA Fabrication
9. Turning Waste Into Worth – How Kerone Is Harnessing Biochar For Sustainability
Author: Shivam Chaurasia
10. The Importance Of The Modern Security Audit Services
Author: Qadit
11. Exploring Information Security Management In Bangalore: Protecting Digital Assets In India’s Hotspot For Technology
Author: Qadit
12. Booking Back Office
Author: Anusha Raj
13. Implementing Iso 17025 Requirements In Your Lab Operations
Author: Sarah
14. Lucintel Forecasts The Global Education Erp Market To Grow With A Cagr Of 14.2% From 2024 To 2030
Author: Lucintel LLC
15. Why Quality Matters In Paper Cutting Knife And Blades For Industrial Applications
Author: Perfect Knives






