Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaigns

network threats

AI generated Image

Perhaps the malicious hackers responsible for KmsdBot thought that the only people who would ever send the botnet commands would be careful not to make any typos...During the testing, we noticed the botnet stopped sending attack commands after observing a single malformed command that arrived. The bot doesn’t have error-checking built into its code to verify that the commands are properly formatted. For instance, to avoid falling victim to a botnet it would be wise to check that none of your servers or apps are using default passwords, and ensuring that nothing is defended with weak credentials.

Source read time: 2 min - tripwire.com

Also offered in: Nederlands

More news for you