Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaigns
network threats
All images are copyrighted.
Perhaps the malicious hackers responsible for KmsdBot thought that the only people who would ever send the botnet commands would be careful not to make any typos...During the testing, we noticed the botnet stopped sending attack commands after observing a single malformed command that arrived. The bot doesn’t have error-checking built into its code to verify that the commands are properly formatted. For instance, to avoid falling victim to a botnet it would be wise to check that none of your servers or apps are using default passwords, and ensuring that nothing is defended with weak credentials.
Source read time: 2 min - tripwire.com
Also offered in: Nederlands