Imperva Discovers 'Pulse Wave' DDoS Attacks

Status
Not open for further replies.

Rob1C

Distinguished
Jun 2, 2016
92
11
18,635
Many techniques are employed, a pulse is not new, enabled by more insecure Devices connected to the Internet.

Check your equipment, you're paying for the usage and may receive a letter saying you're getting disconnected because you keep making Crank Phone Calls (or pinging somewhere).

There are many Websites that show some of the action as it happens, here's one: https://cybermap.kaspersky.com/ .
 

bit_user

Polypheme
Ambassador
I'm interested in the mechanics of how this is orchestrated. It sounds like it requires fairly tight synchronization, so I wonder whether there's live command-and-control of the net (which could aid tracing up the chain of command to at least disable the net) or if the bots are given an a priori schedule, along with some adjunct synchronization mechanism (like application-level NTP).

Regardless, the other negative outcome of this could be greater restriction & control over tech devices by governments. Imagine receiving forced firmware updates, when your device connects to the network. And if your device is no longer supported by the vendor, then it can't get online. It's a worst-case scenario, but if bot nets break then internet, desperate lawmakers could try something along those lines...
 
Status
Not open for further replies.