Malware Authors Inadvertently Takedown Own Botnet


network threats


AI generated Image

A Fatal OopsieDuring the testing, the Akamai researchers discovered the bot suddenly stopped working after receiving a command to send a bunch of junk data to, in an apparent bid to DDoS the website. The Akamai researchers found the spot in the malware's code that contained the IP address and port for KmsdBot's C2 server and modified it, so the address pointed to Akamai's IP space. He also says that Akamai was able to replicate the issue by sending the bot it had modified an improperly formatted command of its own.

Source read time: 2 min -

Also offered in: Nederlands

More news for you