Published: Sun, November 06, 2016
Tech | By Dwayne Harmon

Mirai Botnet Attacks on Liberia Drop Off

Mirai Botnet Attacks on Liberia Drop Off

Writing on Medium, Beaumont said: "The attacks are extremely worrying because they suggest a Mirai operator who has enough capacity to seriously impact systems in a nation state".

"Recent reporting demonstrates that botnets comprised of [Internet of Things] devices can be used to conduct unprecedented and powerful attacks that can take down websites", the Federal Bureau of Investigation notice said. "Given the volume of traffic, it appears to be the owned by the actor which attacked Dyn". This is confirmed by a Twitter account run by the firm called @Miraiattacks.

DDoS attacks blast streams of unwanted data traffic to websites, online gaming companies, ISPs and other entities, aiming to make their services unresponsive. Researchers have been following the attacks for some time, and in recent days the the botnet has been launching repeated large-scale attacks against networks in Liberia. Or, imagine the US Post Office, FedEx, or UPS experiencing an attack during their busiest shipping times. The rise of these botnets, and the DDoS attacks they power, should be addressed by every company.

While today's DDoS attack was resolved relatively quickly, a number of news sites described it as having shut down "half the Internet" for users on the East Coast.

"The Genie is out of the bottle", Pironti said. This provides the attacker with multiple ways to gain control of the camera.

The source code for Mirai, which means "Future" in Japanese, has recently been made public so it is hard to determine which group are behind the attacks.

Early indications are that hackers used the same techniques against the country's rudimentary net infrastructure using the same method that rendered hundreds of the world's most popular websites inaccessible at the end of October.

Organizations should also train employees to recognize the signs of a potential DDoS and report it to IT, so that mitigation efforts can be enacted to limit outage.

Researchers have now found that the Liberian attack used the same Mirai bonnet that took down several major companies offline two weeks ago.

There are some cybersecurity experts, however, who believe the attacks in Liberia are more about demonstrating the capabilities of the Mirai botnet.

And as you won't be surprised to hear if you've been following these stories, this is another assault which leverages the Mirai botnet to fire tons of traffic at the victim - that's been the source of all these big attacks since the first massive volley against security researcher Brian Krebs (which reached some 620Gbps).

Like this: