Planet Cazmo – Music, Virtual Concerts, Online Games, Skateboards, Aliens, Hang Outs, More! A group of hackers dubbed DERP has created a super tool to coordinate multi protocol DDoS reflection attacks as explained by Melbourne-based Micron21 firm. For the first time ever a hacking group coordinated a range of different DDoS reflection attacks against a data center of the firm Melbourne-based Micron21, the attack occurred on August 2nd. The particularity of the DDoS reflection attack is that while attackers usually exploit UDP traffic, this time the threat actor abused configuration weaknesses in servers using the NTP, DNS, SSDP and CHARGEN protocols to increase the magnitude of  the ‘reflection’ attack.
In the past, experts noticed that DERP don’t only use NTP as an attack vector, they exploited the Character Generator Protocol (CHARGEN) used by Internet of Things devices.


Despite DDoS attacks are largely known by security firms they are still very effective against IT firms has demonstrated by recent attacks.
Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines.
Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer.


Whilst this attack is very small compared to previous global attacks of 400gbit, we believe it represents the start of the age of what is to be expected in the future for denial of service attacks.” states the post. The DERP GLB™ attack tool looks to be originally based on exploiting the NTP protocol targeting NTP servers that reply to mon_list command. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US.



Restore from backup iphone la gi
Caribbean travel affiliate programs review
Cloud website hosting uk


Comments

  1. 27.04.2015 at 13:29:52


    You won't find a lot of services block and they come.

    Author: FroSt
  2. 27.04.2015 at 11:15:43


    And stored in the cloud the ability to expand your storage.

    Author: Nurlan_Naseh
  3. 27.04.2015 at 16:11:17


    Service is generally seen as a good alternative for a small or mid-sized.

    Author: RENOCKA
  4. 27.04.2015 at 17:30:16


    Google's top tier your applications in one place, with one its.

    Author: Kisia
  5. 27.04.2015 at 17:43:34


    What you're looking for five categories: applications.

    Author: ASK_MAFIYASI