CyberWisdom Safe Harbor Commentary on DDoS Attack:
DDoS attacks by ABN Amro started per bank statement on Saturday, while two other banks were attacked Monday.
Also Monday, Belastingdienst admitted that it had suffered a DDoS attack, preventing users from logging on to their portal and submitting tax-related documents.
DDoS attack reached 40 Gbps
According to Rickey Gevers, a Dutch security researcher, the number of these attacks reached a peak of 40 Gbps. He also said that these attacks come mainly from the IP address associated with the home router. A report by NL Times citing anti-virus vendors ESET claims that some DDoS attacks were also conducted using Zbot malware, a known (desktop-based) bank Trojan based on the old ZeuS bank trojan.
The same report claimed that the botnet command and control server in Russia.
Many people worry that DDoS attacks are the response to last week’s exposure
The obsession with the Russian media by the Dutch media is not by accident. Last week, a report was published by Dutch newspapers Volkskrant and NOS television, claiming that the country’s AIVD intelligence service violated computers that were part of the hacker for Cozy Bear, also known as APT29, a Russian cyber espionage agency.
GandCrab Ransomware Distributed by Exploit Kits, Appends GDCB Extension Scientists Warn of Transduction Attacks on Sensors Tor-to-Web Proxy Caught Replacing Bitcoin Addresses on Ransomware Payment Sites Teen Sentenced 8 Years in Prison for Buying Bomb on the Dark Web to Kill Parents Cisco Fixes Remote Code Execution Bug Rated 10 Out of 10 on Severity Scale InsaneCrypt (desuCrypt) Decrypter How to remove Www.ab4hr.com Redirects Remove the FF AntiVir Monitoring Firefox Addon Remove the 11 Pumpkin Flavored Foods Chrome Extension Remove Security Tool and SecurityTool (Uninstall Guide) How to remove Antivirus 2009 (Uninstall Instructions) How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller Locky Ransomware Information, Help Guide, and FAQ CryptoLocker Ransomware Information Guide and FAQ CryptorBit and HowDecrypt Information Guide and FAQ CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ How to Rename a Hyper-V Virtual Machine using PowerShell & Hyper-V Manager How to Install Hyper-V in Windows 10 How to Enable CPU Virtualization in Your Computer’s BIOS How to open a Windows 10 Elevated Command Prompt How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware… Engaging post, Read More…
thumbnail courtesy of bleepingcomputer.com
If you like to receive more of these curated safe harbor news alerts then subscribe to my mailing list. and come back soon at https://www.safeharboroncyber.com/Blog/ to read further CyberWisdom Safe Harbor Commentaries. Home » Curated SafeHarboronCyber’s CyberWisdom Post »