• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

“Hinata” Botnet Could Launch Massive DDoS Attacks

You are here: Home / Cyber Security News / “Hinata” Botnet Could Launch Massive DDoS Attacks

Scientists have discovered a new DDoS botnet able of launching attacks with details volumes achieving various Tbps.

Akamai explained the malware by itself was christened “Hinata” by its writer immediately after a character from the Naruto anime collection. The security seller found proof of the “HinataBot” in its HTTP and SSH honeypots and stated it is staying actively up-to-date by its authors.

Although past variations released DDoS flooding assaults in excess of a number of protocols, the newest HinataBot iteration takes advantage of just HTTP and UDP flooding tactics.

The actors driving HinataBot at first distributed Mirai binaries, and there are several nods to the infamous open source botnet in this new Go-dependent effort and hard work, Akamai reported.

Go through extra on Mirai: Mirai Gears Up For Company Assaults.

“HinataBot is the most recent in the ever-developing list of emerging Go-centered threats that features botnets this sort of as GoBruteForcer and the a short while ago discovered (by SIRT) kmsdbot,” it spelled out.

“Go has been leveraged by attackers to experience the advantages of its large general performance, relieve of multi-threading, its various architecture and operating procedure cross-compilation assist, but also likely because it adds complexity when compiled, escalating the difficulty of reverse engineering the ensuing binaries.”

The seller claimed that, whilst packet dimension for HTTP ranged among 484 and 589 bytes, UDP packets were being notably larger sized at 65,549 bytes.

Akamai designed its have command-and-management (C2) infrastructure and ran simulated assaults.

“Using our 10-2nd sample sets and a theorized sizing of the botnet, we can commence estimating attack sizing,” it explained.

“If the botnet contained just 1000 nodes, the resulting UDP flood would weigh in at all over 336 Gbps for each second. With 10,000 nodes (approximately 6.9% of the dimensions of Mirai at its peak), the UDP flood would weigh in at more than 3.3 Tbps. The HTTP flood at 1000 nodes would produce around 2.7 Gbps and more than 2 Mrps. With 10,000 nodes, people figures jump to 27 Gbps delivering 20.4 Mrps.”

The botnet grows by obtaining and exploiting old vulnerabilities and brute-forcing weak passwords, reinforcing the need to have for companies to create cyber-hygiene into their security approaches.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Researchers Shed Light on CatB Ransomware’s Evasion Techniques
Next Post: New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply Chain Breaches »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.