Didn't See A Thread On This

MIKE SPLEAN

Superstar
Joined
Jan 29, 2015
Messages
8,399
Reputation
570
Daps
21,675
Hacker Releases Code That Powered Record-Breaking Botnet Attack
October 2, 2016 // 12:00 PM EST
It’s only been a few weeks since hackers hijacked more than 1 million Internet of Things devices to launch a record-breaking Distributed Denial of Service (DDoS) attack against the website of cybersecurity reporter Brian Krebs.

Now, the malware that powered the unprecedented attack has been released online for anyone to use.

A link to the malware code, first spotted by Krebs, was posted in the criminal hacker site Hackforum by a user named “Anna-senpai,” who dubbed the malware “Mirai.” The malware is designed to infect Internet of Things (IoT) devices that haven’t changed their default usernames and passwords—a common occurrence in the frighteningly poor security used by IoT products like web cams, “smart” refrigerators, and other internet-connected home appliances. Once assembled, these massive armies of zombie devices can be controlled from a central server, where they are typically leased out to other criminal hackers to launch DdoS attacks against target websites
.

“When I first go in DDoS industry, I wasn’t planning on staying in it long. I made my money, there’s lots of eyes looking at IOT now, so it’s time to GTFO,” Anna-senpai wrote. “So today, I have an amazing release for you. With Mirai, I usually pull max 380k bots from telnet alone. However, after the Kreb [sic] DDoS, ISPs been slowly shutting down and cleaning up their act. Today, max pull is about 300k bots, and dropping.”

“So, I am your senpai, and I will treat you real nice, my hf-chan,” Anna-senpai added, cheekily using the Japanese honorific for a fellow classmate.

It’s unclear why the malware’s authors chose to dump the code online, since the ability to grow botnets can be a big moneymaking asset in the criminal hacking world. But Anna-chan’s Hackforums post seems to suggest that spreading the malware code around is a way for its creators to confuse attribution attempts, now that the Krebs DDoS attack has brought increased attention.

"Miscreants who develop malicious software often dump their source code publicly when law enforcement investigators and security firms start sniffing around a little too close to home,” Krebs writes. “Publishing the code online for all to see and download ensures that the code’s original authors aren’t the only ones found possessing it if and when the authorities come knocking with search warrants.”


:damn:
 

KingsOfKings

🌫️ 𝖇𝖊𝖑𝖔𝖜 𝖙𝖍𝖊 𝖍𝖊𝖆𝖛𝖊𝖓𝖘 🌫️
Joined
Sep 20, 2014
Messages
82,286
Reputation
43,189
Daps
104,391
Explain breh
 

Gold

Veteran
Supporter
Joined
Aug 25, 2015
Messages
43,729
Reputation
19,692
Daps
292,964
Translation for those who are asking what it mean.

In laymen's terms:

Its a piece of malware (malicious software) designed to get onto poorly secured devices, and tell those devices to try to reach a server (chosen by the creator of the malware).

The idea is that if you have enough devices trying to send and receive traffic from a host (server, server cluster, etc), the host has to respond to each of them.
There is a set amount of time in which a server is allowed to respond to a request before it "times out".
A timeout is designed to ensure that servers under load don't try to respond to very old requests.

So essentially.... if you get enough devices repeatedly sending request to a server, you can put it into an indefinite timeout state.

This is called DoSing (Denial of Service).

When a server enters this state, not only is not responding to outside queries, but it will probably be very bogged down internally and need to separated from the network and taken offline.


Its not really "hacking", but its effective nonetheless
 

Geek Nasty

Brain Knowledgeably Whizzy
Supporter
Joined
Jan 30, 2015
Messages
31,987
Reputation
5,770
Daps
121,479
Reppin
South Kakalaka
i don't understand. what does it all mean? :damn:

Some appliances (web camera, fridges, washers/dryers) have internet access. IF you don't change the password, someone who can connect to it can set it up for you. This guy has a network of 1/2 a million devices he took over that he can use to flood websites with garbage to clog up it's internet access. He just gave away the app he uses to launch it.

Hope some government finds him and gets medieval on his ass.
 

CoochieMane

#Wholesomegang
Joined
Sep 25, 2015
Messages
6,749
Reputation
2,691
Daps
27,945
Reppin
Trinidad
On a scale of 1-10 how illegal is this? I'm asking for a friend that might want to try it, and don't worry I'm sure he gonna be using Tor browser with a proxy server so he probably safe.
 

Geek Nasty

Brain Knowledgeably Whizzy
Supporter
Joined
Jan 30, 2015
Messages
31,987
Reputation
5,770
Daps
121,479
Reppin
South Kakalaka
On a scale of 1-10 how illegal is this? I'm asking for a friend that might want to try it, and don't worry I'm sure he gonna be using Tor browser with a proxy server so he probably safe.

Dont fukk with it. People think they're "hackers" by running these scripts, but the people who usually get caught are the rookies just playing around with shyt they found online. Remember how kids used to always get caught hacking? People thought there was a bunch of genius kids out there hacking government systems. Nope, they were the suckers running the hacking tools off their school networks and not knowing how to cover their tracks.
 
Top