SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
SEPTEMBER
KREBSONSECURITY HIT BY
RECORD-BREAKING DDOS
The website of researcher Brian Krebs is
attacked by a botnet using IoT devices to
AUGUST
MIRAI IS DISCOVERED
Security researchers at MalwareMustDie
uncover a new trojan - the binary
was called “Mirai.*”.
SEPTEMBER
OCTOBER
SOURCE CODE DUMPED ONLINE
A user by the name of ‘Anna-Senpei’ posts
their tracks. Mirai becomes open source.
OCTOBER
MIRAI’S NETWORK DOUBLES IN SIZE
Colorado's Level 3 Communications estimates
the number of devices compromised by
Mirai rise from 213,000 to 493,000.
SOURCE CODE
OCTOBER
MIRAI HITS DYN
A huge DDoS using Mirai hits Dyn, a company
that controls much of the internet’s domain
name system infrastructure. Spotify, Reddit and
MIRAI HITS OVH
French cloud and web hosting company
OVH reports a huge attack on several
of its customer's websites.
NOVEMBER
GERMANY UNDER ATTACK
An updated type of Mirai that exploits security
flaws in routers brings down web access for
almost a million Deutsche Telekom
customers for two days.
NOVEMBER
TO THE HIGHEST BIDDER
Two hackers ‘BestBuy’ and ‘Popopret’, the
two behind the Deutsche Telekom attack,
advertise their Mirai botnet of 400,000 for
rent online.
NOVEMBER
TALKTALK IS TARGETED
At least 55,000 of TalkTalk’s customers
lose internet connection for several days.
JANUARY
ACCUSATIONS FLY
Brian Krebs puts in ‘100’s of hours of research’
and claims there are similarities between
‘Anna-Senpai’ & Paras Jha, owner of a DDoS
mitigation company.
FEBRUARY
MIRAI EVOLVES ONTO WINDOWS
Kaspersky Lab finds a hacker has created a
version of Mirai based on the Windows OS.
FEBRUARY
AN ARREST IS MADE
A 29-year-old British man is arrested under
suspicion of carrying out the Deutsche Telekom
attack. Germany pushes for extradition.
MARCH
MIRAI IS “HYDRA”
says Bryant Townsend, CEO of Backconnect,
in a reference to the mythical many-headed
serpent.
THE ENEMY WITHIN IOT
MIRAI & DDOS - A TIMELINE
2016 saw the emergence of the
most devastating DDoS tool ever
created - Mirai
NEXT
WHAT
For more tech insights visit
interquestgroup.com
...........

Mais conteúdo relacionado

Mais procurados

10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West 10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West Entefy
 
Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters? Viral Parmar
 
A flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet ExplorerA flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet ExplorerMichael Holt
 
Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochureGeorge Wainblat
 
Internet of Things, Connected Device Growth
Internet of Things, Connected Device GrowthInternet of Things, Connected Device Growth
Internet of Things, Connected Device GrowthCreator Global
 
Why Digital Forensics as a Career?
Why Digital Forensics as a Career? Why Digital Forensics as a Career?
Why Digital Forensics as a Career? EC-Council
 
Cisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the NumbersCisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the NumbersCisco Service Provider
 
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTECFIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTECFIWARE Mexico
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPaloAltoNetworks
 
Introducción a Briar: inter-conectarse sin internet
Introducción a Briar: inter-conectarse sin internetIntroducción a Briar: inter-conectarse sin internet
Introducción a Briar: inter-conectarse sin internetBarbara Maseda
 
Recap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farRecap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farHardik Ashok Kevadiya
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareAirTight Networks
 
John harrobin verizon wireless and skype to have news conference at ctia
John harrobin verizon wireless and skype to have news conference at ctiaJohn harrobin verizon wireless and skype to have news conference at ctia
John harrobin verizon wireless and skype to have news conference at ctiadakshseo5
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 

Mais procurados (16)

10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West 10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West
 
Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters?
 
A flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet ExplorerA flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet Explorer
 
Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochure
 
Internet of Things, Connected Device Growth
Internet of Things, Connected Device GrowthInternet of Things, Connected Device Growth
Internet of Things, Connected Device Growth
 
Why Digital Forensics as a Career?
Why Digital Forensics as a Career? Why Digital Forensics as a Career?
Why Digital Forensics as a Career?
 
Cisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the NumbersCisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the Numbers
 
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTECFIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
Introducción a Briar: inter-conectarse sin internet
Introducción a Briar: inter-conectarse sin internetIntroducción a Briar: inter-conectarse sin internet
Introducción a Briar: inter-conectarse sin internet
 
Recap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farRecap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so far
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
 
John harrobin verizon wireless and skype to have news conference at ctia
John harrobin verizon wireless and skype to have news conference at ctiaJohn harrobin verizon wireless and skype to have news conference at ctia
John harrobin verizon wireless and skype to have news conference at ctia
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Ijscs
IjscsIjscs
Ijscs
 

Semelhante a The Enemy Within IoT - A Mirai DDoS Timeline

HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataParsons Behle & Latimer
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in MaySathish Kumar K
 
Understanding the mirai botnet
Understanding the mirai botnetUnderstanding the mirai botnet
Understanding the mirai botnetFelipe Prado
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Jay Beale
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdfHiYeti1
 
seqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdfseqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdfsatheesh kumar
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017chauhananand17
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017Dryden Geary
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecRaghunath G
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
2010 za con_barry_irwin
2010 za con_barry_irwin2010 za con_barry_irwin
2010 za con_barry_irwinJohan Klerk
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxhelen23456789
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickStefan Tanase
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaSergio Renteria Nuñez
 
Nastiest Malware 2021
Nastiest Malware 2021Nastiest Malware 2021
Nastiest Malware 2021tsevier
 

Semelhante a The Enemy Within IoT - A Mirai DDoS Timeline (20)

HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
Understanding the mirai botnet
Understanding the mirai botnetUnderstanding the mirai botnet
Understanding the mirai botnet
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
Cybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. IICybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. II
 
seqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdfseqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdf
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
2010 za con_barry_irwin
2010 za con_barry_irwin2010 za con_barry_irwin
2010 za con_barry_irwin
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 
File000145
File000145File000145
File000145
 
News Bytes
News BytesNews Bytes
News Bytes
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
 
Nastiest Malware 2021
Nastiest Malware 2021Nastiest Malware 2021
Nastiest Malware 2021
 

Mais de InterQuest Group

InterQuest Core Values Booklet
InterQuest Core Values BookletInterQuest Core Values Booklet
InterQuest Core Values BookletInterQuest Group
 
A Day In The Life Of A Delivery Consultant
A Day In The Life Of A Delivery ConsultantA Day In The Life Of A Delivery Consultant
A Day In The Life Of A Delivery ConsultantInterQuest Group
 
Top 10 Strategic Tech Trends 2018 Pt 2
Top 10 Strategic Tech Trends 2018 Pt 2Top 10 Strategic Tech Trends 2018 Pt 2
Top 10 Strategic Tech Trends 2018 Pt 2InterQuest Group
 
Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1InterQuest Group
 
Motivation In The Work Place
Motivation In The Work PlaceMotivation In The Work Place
Motivation In The Work PlaceInterQuest Group
 
AI Machine Learning: A Forecast
AI Machine Learning: A ForecastAI Machine Learning: A Forecast
AI Machine Learning: A ForecastInterQuest Group
 
Is The World Prepared For GDPR?
Is The World Prepared For GDPR?Is The World Prepared For GDPR?
Is The World Prepared For GDPR?InterQuest Group
 
Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017InterQuest Group
 
Biometric Security: Consumer Demand
Biometric Security: Consumer DemandBiometric Security: Consumer Demand
Biometric Security: Consumer DemandInterQuest Group
 
What Is Universal Basic Income?
What Is Universal Basic Income? What Is Universal Basic Income?
What Is Universal Basic Income? InterQuest Group
 
How To Make DevOps Work For You
How To Make DevOps Work For YouHow To Make DevOps Work For You
How To Make DevOps Work For YouInterQuest Group
 
How To Stay Motivated At Work
How To Stay Motivated At WorkHow To Stay Motivated At Work
How To Stay Motivated At WorkInterQuest Group
 
[Infographic] Future Tech In The Workplace
[Infographic] Future Tech In The Workplace[Infographic] Future Tech In The Workplace
[Infographic] Future Tech In The WorkplaceInterQuest Group
 
Top 10 Highest Paying Analytics Jobs
Top 10 Highest Paying Analytics Jobs Top 10 Highest Paying Analytics Jobs
Top 10 Highest Paying Analytics Jobs InterQuest Group
 
Most In Demand Information Security Skills
Most In Demand Information Security SkillsMost In Demand Information Security Skills
Most In Demand Information Security SkillsInterQuest Group
 

Mais de InterQuest Group (20)

InterQuest Core Values Booklet
InterQuest Core Values BookletInterQuest Core Values Booklet
InterQuest Core Values Booklet
 
A Day In The Life Of A Delivery Consultant
A Day In The Life Of A Delivery ConsultantA Day In The Life Of A Delivery Consultant
A Day In The Life Of A Delivery Consultant
 
Top 10 Strategic Tech Trends 2018 Pt 2
Top 10 Strategic Tech Trends 2018 Pt 2Top 10 Strategic Tech Trends 2018 Pt 2
Top 10 Strategic Tech Trends 2018 Pt 2
 
Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1
 
Motivation In The Work Place
Motivation In The Work PlaceMotivation In The Work Place
Motivation In The Work Place
 
AI Machine Learning: A Forecast
AI Machine Learning: A ForecastAI Machine Learning: A Forecast
AI Machine Learning: A Forecast
 
Top 10 Tech Jobs 2018
Top 10 Tech Jobs 2018Top 10 Tech Jobs 2018
Top 10 Tech Jobs 2018
 
Is The World Prepared For GDPR?
Is The World Prepared For GDPR?Is The World Prepared For GDPR?
Is The World Prepared For GDPR?
 
Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017
 
Biometric Security: Consumer Demand
Biometric Security: Consumer DemandBiometric Security: Consumer Demand
Biometric Security: Consumer Demand
 
What Is Universal Basic Income?
What Is Universal Basic Income? What Is Universal Basic Income?
What Is Universal Basic Income?
 
The Robots Among Us
The Robots Among UsThe Robots Among Us
The Robots Among Us
 
How To Make DevOps Work For You
How To Make DevOps Work For YouHow To Make DevOps Work For You
How To Make DevOps Work For You
 
IoT Growth: A Forecast
IoT Growth: A ForecastIoT Growth: A Forecast
IoT Growth: A Forecast
 
How To Stay Motivated At Work
How To Stay Motivated At WorkHow To Stay Motivated At Work
How To Stay Motivated At Work
 
[Infographic] Future Tech In The Workplace
[Infographic] Future Tech In The Workplace[Infographic] Future Tech In The Workplace
[Infographic] Future Tech In The Workplace
 
UX with George Crotty
UX with George CrottyUX with George Crotty
UX with George Crotty
 
Top 10 Highest Paying Analytics Jobs
Top 10 Highest Paying Analytics Jobs Top 10 Highest Paying Analytics Jobs
Top 10 Highest Paying Analytics Jobs
 
Most In Demand Information Security Skills
Most In Demand Information Security SkillsMost In Demand Information Security Skills
Most In Demand Information Security Skills
 
Top 10 Tech Jobs for 2016
Top 10 Tech Jobs for 2016Top 10 Tech Jobs for 2016
Top 10 Tech Jobs for 2016
 

Último

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 

Último (9)

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 

The Enemy Within IoT - A Mirai DDoS Timeline

  • 1. SEPTEMBER KREBSONSECURITY HIT BY RECORD-BREAKING DDOS The website of researcher Brian Krebs is attacked by a botnet using IoT devices to AUGUST MIRAI IS DISCOVERED Security researchers at MalwareMustDie uncover a new trojan - the binary was called “Mirai.*”. SEPTEMBER OCTOBER SOURCE CODE DUMPED ONLINE A user by the name of ‘Anna-Senpei’ posts their tracks. Mirai becomes open source. OCTOBER MIRAI’S NETWORK DOUBLES IN SIZE Colorado's Level 3 Communications estimates the number of devices compromised by Mirai rise from 213,000 to 493,000. SOURCE CODE OCTOBER MIRAI HITS DYN A huge DDoS using Mirai hits Dyn, a company that controls much of the internet’s domain name system infrastructure. Spotify, Reddit and MIRAI HITS OVH French cloud and web hosting company OVH reports a huge attack on several of its customer's websites. NOVEMBER GERMANY UNDER ATTACK An updated type of Mirai that exploits security flaws in routers brings down web access for almost a million Deutsche Telekom customers for two days. NOVEMBER TO THE HIGHEST BIDDER Two hackers ‘BestBuy’ and ‘Popopret’, the two behind the Deutsche Telekom attack, advertise their Mirai botnet of 400,000 for rent online. NOVEMBER TALKTALK IS TARGETED At least 55,000 of TalkTalk’s customers lose internet connection for several days. JANUARY ACCUSATIONS FLY Brian Krebs puts in ‘100’s of hours of research’ and claims there are similarities between ‘Anna-Senpai’ & Paras Jha, owner of a DDoS mitigation company. FEBRUARY MIRAI EVOLVES ONTO WINDOWS Kaspersky Lab finds a hacker has created a version of Mirai based on the Windows OS. FEBRUARY AN ARREST IS MADE A 29-year-old British man is arrested under suspicion of carrying out the Deutsche Telekom attack. Germany pushes for extradition. MARCH MIRAI IS “HYDRA” says Bryant Townsend, CEO of Backconnect, in a reference to the mythical many-headed serpent. THE ENEMY WITHIN IOT MIRAI & DDOS - A TIMELINE 2016 saw the emergence of the most devastating DDoS tool ever created - Mirai NEXT WHAT For more tech insights visit interquestgroup.com ...........