SlideShare a Scribd company logo
SEPTEMBER
KREBSONSECURITY HIT BY
RECORD-BREAKING DDOS
The website of researcher Brian Krebs is
attacked by a botnet using IoT devices to
AUGUST
MIRAI IS DISCOVERED
Security researchers at MalwareMustDie
uncover a new trojan - the binary
was called “Mirai.*”.
SEPTEMBER
OCTOBER
SOURCE CODE DUMPED ONLINE
A user by the name of ‘Anna-Senpei’ posts
their tracks. Mirai becomes open source.
OCTOBER
MIRAI’S NETWORK DOUBLES IN SIZE
Colorado's Level 3 Communications estimates
the number of devices compromised by
Mirai rise from 213,000 to 493,000.
SOURCE CODE
OCTOBER
MIRAI HITS DYN
A huge DDoS using Mirai hits Dyn, a company
that controls much of the internet’s domain
name system infrastructure. Spotify, Reddit and
MIRAI HITS OVH
French cloud and web hosting company
OVH reports a huge attack on several
of its customer's websites.
NOVEMBER
GERMANY UNDER ATTACK
An updated type of Mirai that exploits security
flaws in routers brings down web access for
almost a million Deutsche Telekom
customers for two days.
NOVEMBER
TO THE HIGHEST BIDDER
Two hackers ‘BestBuy’ and ‘Popopret’, the
two behind the Deutsche Telekom attack,
advertise their Mirai botnet of 400,000 for
rent online.
NOVEMBER
TALKTALK IS TARGETED
At least 55,000 of TalkTalk’s customers
lose internet connection for several days.
JANUARY
ACCUSATIONS FLY
Brian Krebs puts in ‘100’s of hours of research’
and claims there are similarities between
‘Anna-Senpai’ & Paras Jha, owner of a DDoS
mitigation company.
FEBRUARY
MIRAI EVOLVES ONTO WINDOWS
Kaspersky Lab finds a hacker has created a
version of Mirai based on the Windows OS.
FEBRUARY
AN ARREST IS MADE
A 29-year-old British man is arrested under
suspicion of carrying out the Deutsche Telekom
attack. Germany pushes for extradition.
MARCH
MIRAI IS “HYDRA”
says Bryant Townsend, CEO of Backconnect,
in a reference to the mythical many-headed
serpent.
THE ENEMY WITHIN IOT
MIRAI & DDOS - A TIMELINE
2016 saw the emergence of the
most devastating DDoS tool ever
created - Mirai
NEXT
WHAT
For more tech insights visit
interquestgroup.com
...........

More Related Content

What's hot

10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West 10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West
Entefy
 
Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters?
Viral Parmar
 
A flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet ExplorerA flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet ExplorerMichael Holt
 
Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochure
George Wainblat
 
Internet of Things, Connected Device Growth
Internet of Things, Connected Device GrowthInternet of Things, Connected Device Growth
Internet of Things, Connected Device Growth
Creator Global
 
Why Digital Forensics as a Career?
Why Digital Forensics as a Career? Why Digital Forensics as a Career?
Why Digital Forensics as a Career?
EC-Council
 
Cisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the NumbersCisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the Numbers
Cisco Service Provider
 
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTECFIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE Mexico
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
PaloAltoNetworks
 
Introducción a Briar: inter-conectarse sin internet
Introducción a Briar: inter-conectarse sin internetIntroducción a Briar: inter-conectarse sin internet
Introducción a Briar: inter-conectarse sin internet
Barbara Maseda
 
Recap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farRecap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so far
Hardik Ashok Kevadiya
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
PranavRaj96
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
AirTight Networks
 
John harrobin verizon wireless and skype to have news conference at ctia
John harrobin verizon wireless and skype to have news conference at ctiaJohn harrobin verizon wireless and skype to have news conference at ctia
John harrobin verizon wireless and skype to have news conference at ctia
dakshseo5
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
Case IQ
 
Ijscs
IjscsIjscs

What's hot (16)

10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West 10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West
 
Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters?
 
A flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet ExplorerA flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet Explorer
 
Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochure
 
Internet of Things, Connected Device Growth
Internet of Things, Connected Device GrowthInternet of Things, Connected Device Growth
Internet of Things, Connected Device Growth
 
Why Digital Forensics as a Career?
Why Digital Forensics as a Career? Why Digital Forensics as a Career?
Why Digital Forensics as a Career?
 
Cisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the NumbersCisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the Numbers
 
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTECFIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
Introducción a Briar: inter-conectarse sin internet
Introducción a Briar: inter-conectarse sin internetIntroducción a Briar: inter-conectarse sin internet
Introducción a Briar: inter-conectarse sin internet
 
Recap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farRecap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so far
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
 
John harrobin verizon wireless and skype to have news conference at ctia
John harrobin verizon wireless and skype to have news conference at ctiaJohn harrobin verizon wireless and skype to have news conference at ctia
John harrobin verizon wireless and skype to have news conference at ctia
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Ijscs
IjscsIjscs
Ijscs
 

Similar to The Enemy Within IoT - A Mirai DDoS Timeline

HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
Parsons Behle & Latimer
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
Sathish Kumar K
 
Understanding the mirai botnet
Understanding the mirai botnetUnderstanding the mirai botnet
Understanding the mirai botnet
Felipe Prado
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Jay Beale
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
HiYeti1
 
Cybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. IICybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. II
ITrust - Cybersecurity as a Service
 
seqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdfseqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdf
satheesh kumar
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
chauhananand17
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
Dryden Geary
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Raghunath G
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
BryCunal
 
2010 za con_barry_irwin
2010 za con_barry_irwin2010 za con_barry_irwin
2010 za con_barry_irwinJohan Klerk
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
helen23456789
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
Quick Heal Technologies Ltd.
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
Stefan Tanase
 
News Bytes
News BytesNews Bytes
News Bytes
Megha Sahu
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
Sergio Renteria Nuñez
 
Nastiest Malware 2021
Nastiest Malware 2021Nastiest Malware 2021
Nastiest Malware 2021
tsevier
 

Similar to The Enemy Within IoT - A Mirai DDoS Timeline (20)

HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
Understanding the mirai botnet
Understanding the mirai botnetUnderstanding the mirai botnet
Understanding the mirai botnet
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
Cybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. IICybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. II
 
seqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdfseqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdf
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
2010 za con_barry_irwin
2010 za con_barry_irwin2010 za con_barry_irwin
2010 za con_barry_irwin
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 
File000145
File000145File000145
File000145
 
News Bytes
News BytesNews Bytes
News Bytes
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
 
Nastiest Malware 2021
Nastiest Malware 2021Nastiest Malware 2021
Nastiest Malware 2021
 

More from InterQuest Group

InterQuest Core Values Booklet
InterQuest Core Values BookletInterQuest Core Values Booklet
InterQuest Core Values Booklet
InterQuest Group
 
A Day In The Life Of A Delivery Consultant
A Day In The Life Of A Delivery ConsultantA Day In The Life Of A Delivery Consultant
A Day In The Life Of A Delivery Consultant
InterQuest Group
 
Top 10 Strategic Tech Trends 2018 Pt 2
Top 10 Strategic Tech Trends 2018 Pt 2Top 10 Strategic Tech Trends 2018 Pt 2
Top 10 Strategic Tech Trends 2018 Pt 2
InterQuest Group
 
Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1
InterQuest Group
 
Motivation In The Work Place
Motivation In The Work PlaceMotivation In The Work Place
Motivation In The Work Place
InterQuest Group
 
AI Machine Learning: A Forecast
AI Machine Learning: A ForecastAI Machine Learning: A Forecast
AI Machine Learning: A Forecast
InterQuest Group
 
Top 10 Tech Jobs 2018
Top 10 Tech Jobs 2018Top 10 Tech Jobs 2018
Top 10 Tech Jobs 2018
InterQuest Group
 
Is The World Prepared For GDPR?
Is The World Prepared For GDPR?Is The World Prepared For GDPR?
Is The World Prepared For GDPR?
InterQuest Group
 
Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017
InterQuest Group
 
Biometric Security: Consumer Demand
Biometric Security: Consumer DemandBiometric Security: Consumer Demand
Biometric Security: Consumer Demand
InterQuest Group
 
What Is Universal Basic Income?
What Is Universal Basic Income? What Is Universal Basic Income?
What Is Universal Basic Income?
InterQuest Group
 
The Robots Among Us
The Robots Among UsThe Robots Among Us
The Robots Among Us
InterQuest Group
 
How To Make DevOps Work For You
How To Make DevOps Work For YouHow To Make DevOps Work For You
How To Make DevOps Work For You
InterQuest Group
 
IoT Growth: A Forecast
IoT Growth: A ForecastIoT Growth: A Forecast
IoT Growth: A Forecast
InterQuest Group
 
How To Stay Motivated At Work
How To Stay Motivated At WorkHow To Stay Motivated At Work
How To Stay Motivated At Work
InterQuest Group
 
[Infographic] Future Tech In The Workplace
[Infographic] Future Tech In The Workplace[Infographic] Future Tech In The Workplace
[Infographic] Future Tech In The Workplace
InterQuest Group
 
UX with George Crotty
UX with George CrottyUX with George Crotty
UX with George Crotty
InterQuest Group
 
Top 10 Highest Paying Analytics Jobs
Top 10 Highest Paying Analytics Jobs Top 10 Highest Paying Analytics Jobs
Top 10 Highest Paying Analytics Jobs
InterQuest Group
 
Most In Demand Information Security Skills
Most In Demand Information Security SkillsMost In Demand Information Security Skills
Most In Demand Information Security Skills
InterQuest Group
 
Top 10 Tech Jobs for 2016
Top 10 Tech Jobs for 2016Top 10 Tech Jobs for 2016
Top 10 Tech Jobs for 2016
InterQuest Group
 

More from InterQuest Group (20)

InterQuest Core Values Booklet
InterQuest Core Values BookletInterQuest Core Values Booklet
InterQuest Core Values Booklet
 
A Day In The Life Of A Delivery Consultant
A Day In The Life Of A Delivery ConsultantA Day In The Life Of A Delivery Consultant
A Day In The Life Of A Delivery Consultant
 
Top 10 Strategic Tech Trends 2018 Pt 2
Top 10 Strategic Tech Trends 2018 Pt 2Top 10 Strategic Tech Trends 2018 Pt 2
Top 10 Strategic Tech Trends 2018 Pt 2
 
Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1
 
Motivation In The Work Place
Motivation In The Work PlaceMotivation In The Work Place
Motivation In The Work Place
 
AI Machine Learning: A Forecast
AI Machine Learning: A ForecastAI Machine Learning: A Forecast
AI Machine Learning: A Forecast
 
Top 10 Tech Jobs 2018
Top 10 Tech Jobs 2018Top 10 Tech Jobs 2018
Top 10 Tech Jobs 2018
 
Is The World Prepared For GDPR?
Is The World Prepared For GDPR?Is The World Prepared For GDPR?
Is The World Prepared For GDPR?
 
Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017
 
Biometric Security: Consumer Demand
Biometric Security: Consumer DemandBiometric Security: Consumer Demand
Biometric Security: Consumer Demand
 
What Is Universal Basic Income?
What Is Universal Basic Income? What Is Universal Basic Income?
What Is Universal Basic Income?
 
The Robots Among Us
The Robots Among UsThe Robots Among Us
The Robots Among Us
 
How To Make DevOps Work For You
How To Make DevOps Work For YouHow To Make DevOps Work For You
How To Make DevOps Work For You
 
IoT Growth: A Forecast
IoT Growth: A ForecastIoT Growth: A Forecast
IoT Growth: A Forecast
 
How To Stay Motivated At Work
How To Stay Motivated At WorkHow To Stay Motivated At Work
How To Stay Motivated At Work
 
[Infographic] Future Tech In The Workplace
[Infographic] Future Tech In The Workplace[Infographic] Future Tech In The Workplace
[Infographic] Future Tech In The Workplace
 
UX with George Crotty
UX with George CrottyUX with George Crotty
UX with George Crotty
 
Top 10 Highest Paying Analytics Jobs
Top 10 Highest Paying Analytics Jobs Top 10 Highest Paying Analytics Jobs
Top 10 Highest Paying Analytics Jobs
 
Most In Demand Information Security Skills
Most In Demand Information Security SkillsMost In Demand Information Security Skills
Most In Demand Information Security Skills
 
Top 10 Tech Jobs for 2016
Top 10 Tech Jobs for 2016Top 10 Tech Jobs for 2016
Top 10 Tech Jobs for 2016
 

Recently uploaded

Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 

Recently uploaded (16)

Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 

The Enemy Within IoT - A Mirai DDoS Timeline

  • 1. SEPTEMBER KREBSONSECURITY HIT BY RECORD-BREAKING DDOS The website of researcher Brian Krebs is attacked by a botnet using IoT devices to AUGUST MIRAI IS DISCOVERED Security researchers at MalwareMustDie uncover a new trojan - the binary was called “Mirai.*”. SEPTEMBER OCTOBER SOURCE CODE DUMPED ONLINE A user by the name of ‘Anna-Senpei’ posts their tracks. Mirai becomes open source. OCTOBER MIRAI’S NETWORK DOUBLES IN SIZE Colorado's Level 3 Communications estimates the number of devices compromised by Mirai rise from 213,000 to 493,000. SOURCE CODE OCTOBER MIRAI HITS DYN A huge DDoS using Mirai hits Dyn, a company that controls much of the internet’s domain name system infrastructure. Spotify, Reddit and MIRAI HITS OVH French cloud and web hosting company OVH reports a huge attack on several of its customer's websites. NOVEMBER GERMANY UNDER ATTACK An updated type of Mirai that exploits security flaws in routers brings down web access for almost a million Deutsche Telekom customers for two days. NOVEMBER TO THE HIGHEST BIDDER Two hackers ‘BestBuy’ and ‘Popopret’, the two behind the Deutsche Telekom attack, advertise their Mirai botnet of 400,000 for rent online. NOVEMBER TALKTALK IS TARGETED At least 55,000 of TalkTalk’s customers lose internet connection for several days. JANUARY ACCUSATIONS FLY Brian Krebs puts in ‘100’s of hours of research’ and claims there are similarities between ‘Anna-Senpai’ & Paras Jha, owner of a DDoS mitigation company. FEBRUARY MIRAI EVOLVES ONTO WINDOWS Kaspersky Lab finds a hacker has created a version of Mirai based on the Windows OS. FEBRUARY AN ARREST IS MADE A 29-year-old British man is arrested under suspicion of carrying out the Deutsche Telekom attack. Germany pushes for extradition. MARCH MIRAI IS “HYDRA” says Bryant Townsend, CEO of Backconnect, in a reference to the mythical many-headed serpent. THE ENEMY WITHIN IOT MIRAI & DDOS - A TIMELINE 2016 saw the emergence of the most devastating DDoS tool ever created - Mirai NEXT WHAT For more tech insights visit interquestgroup.com ...........