123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Android Based Botnet Launches Ddos Attacks

Profile Picture
By Author: Jason Robertson
Total Articles: 1
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

A multitude of Android devices was being used to launch the attack to the targeted victims through malicious applications on the devices that are running in the background and is programmed to create DDoS traffic.

The earliest signs of attacks

It was on the 2nd of August when the first signs of WireX botnet attack came, but it went on unnoticed at that time. It was only discovered when researchers began analyzing logs and then looked for the 26 character User-Agent string within the logs. Most likely during that stage, it was in the early stages of its development due to its minimal effects.

Why should we be troubled?

Website owners should be worried because those in control of the botnet now have the capability to take down several large websites – putting junk traffic to it and then by consuming too much bandwidth, the website’s pages and services will go down. One should be very conscious about website malware attacks and it’s available protection. Too bad it was used for evil purposes such as causing bad publicity and disruption of legitimate services.

How it attacks

WireX ...
... uses the application layer of apps to launch attacks, being able to harness massive force depending on the number of Android devices it has already affected.

Majority of the affected applications were easily downloaded from Google Play Store, there were over 300 applications reportedly discovered which carries the malware launching the botnet through the apps. The botnet starts a background process on the affected Android device that would seem to launch an unseen browser and emulate series of endless legitimate browsing activities that would look like a human being has done it. The traffic mainly generated by the attack nodes is by HTTP (get) requests, however, there are some variants that was capable of issuing POST requests.

Google removed the discovered apps from the Play Store as soon as they got the report of the incidents, and currently, they are working on removing the apps from the phones of the affected Android devices.

To anyone who suffered a DDoS Attack you may want to verify the following pattern of User-Agent series if it was WireX botnet:

User-Agent: jigpuzbcomkenhvladtwysqfxr

User-Agent: yudjmikcvzoqwsbflghtxpanre

User-Agent: mckvhaflwzbderiysoguxnqtpj

User-Agent: deogjvtynmcxzwfsbahirukqpl

User-Agent: fdmjczoeyarnuqkbgtlivsxhwp

User-Agent: yczfxlrenuqtwmavhojpigkdsb

User-Agent: dnlseufokcgvmajqzpbtrwyxih

What can be done during an attack?

It ought not to be the matter of amazement and stun when even your affirmation saying yes on anything can hurt you. We saw new sort of Voice Phishing and its conceivable outcomes. Security professionals should gather data and metrics and then share it. With the information gathered, experts and those who have the means to counter it can learn much more about it.

Total Views: 294Word Count: 431See All articles From Author

Add Comment

Business Articles

1. Lucintel Forecasts The Canadian Residential Humidifier Market To Reach $234 Million By 2030
Author: Lucintel LLC

2. Boost Your Property’s Value With High-quality Driveway Installations
Author: Vikram kumar

3. Eco-friendly Expertise: Leed Consultancy In Dubai And Uae
Author: kohan

4. Best Travel Websites
Author: RishiHassan

5. Top 5 Essential Dog Training Equipment For Active Dogs: Harnesses, Crates & More
Author: Von Ultimate Dog Shop

6. Mindpath Technology Limited – Transforming Businesses With Innovative It Solutions
Author: Mindpath

7. What Are The Costs Of Charging At Public Stations Vs. Home Chargers?
Author: -

8. When To Diy And When To Call The Professionals
Author: Maria Marshall

9. Uniquemark Solutions: Your Trusted Digital Partner In Pune
Author: Uniquemarks

10. The Ultimate Guide To Optimizing Your Website For Conversions
Author: Peggy Police

11. The Advantages Of Using Walnut Shells In Media Blasting For Industrial Applications
Author: Kramer

12. How To Make Iso 35001 Documentation For Biorisk Management System
Author: Emma

13. How To Make Your Product Photography Stand Out
Author: Sam

14. Experienced House Removalists Brisbane | Quality Packing & Moving Services
Author: Sarahwilliams

15. Best Astrologer In Kacharakanahalli
Author: Astroservice7

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: