Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

100 Countries Hit By Android DDoS Malware

100 Countries Hit By Android DDoS Malware

In what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

How It Works
WireX was designed to use HTTP requests to bombard their targets, directing as many as 20,000 requests to a target every second to use up the target’s server resources. This number of requests may not have been effective, if it weren’t for where WireX would direct its attack on the victim site. Rather than just sending 20,000 requests every second to the website as a whole, WireX would target specific pages that used more of the site’s resources. Search pages were frequently targeted for this reason.

Why Is WireX So Nasty?
There are a few factors that contribute to why WireX managed to cause such a big fuss, so quickly.

First off, although WireX is an Android-powered mobile botnet, the traffic it sends to the targeted website appears to be regular mobile browser traffic. This is a problem, because most experts who focus on defending companies from DDoS attacks utilize filters that help them to sort the malicious traffic out from the legitimate traffic. This is more difficult with WireX, as it includes its own fully-functioning browser that hides its information from the targeted system.

In addition to this, WireX also leverages SSL as a part of its attacks, which usually protects an Android user’s browser session. In this case, however, it only makes WireX more difficult to detect.

Defeating the DDoS
It ultimately took a team of experts from Cloudflare, Akamai, Flashpoint, Dyn, Google, Team Cymru and EiskIQ to stop WireX. The seven companies needed to pool their resources and data on WireX in order to identify it as a mobile-based attack, and then to identify the 300 malicious Google Play Store apps that delivered it. While these apps have not been named to the public, they were often media players, ringtones, or storage managers. Google has since blocked these apps from the Play Store, and has also removed them from the devices that were infected.

So, What Can You Do?
Your most effective defense against threats like WireX and other applications that sneak in malware is to simply not download applications that you don’t trust, as well as to educate employees on why they shouldn’t either. For more information on the latest threats and how you can protect yourself, call Evolve IT at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 25 April 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Business Computing Software User Tips Workplace Tips Computer Google Hosted Solutions Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Ransomware Gmail Hardware Office The Internet of Things Social Media Backup Apps Bandwidth Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Operating System Microsoft Office Best Practice Firewall Alert Content Filtering Cybercrime Networking Data storage Website Data Windows Experience Employer-Employee Relationship History Mobile Device Management Money Two-factor Authentication Network Smartphones Small Business Phishing Managed Service Provider App Outlook Mobile Computing Big Data communications Safety Wireless Technology Unified Threat Management Android Quick Tips Apple Remote Computing Shortcut DDoS Cortana Vendor Management Proactive IT Heating/Cooling Word Network Congestion Save Money Monitors Music Business Management Cryptocurrency Laptop IBM Displays Competition Education Presentation Entrepreneur Google Docs Cleaning Holiday Domains Processors End of Support Black Market YouTube LiFi Staffing Hacker Office Tips BYOD Downtime Help Desk Writing Application Passwords Streaming Media Visible Light Communication Disaster Customer Service Micrsooft Business Growth Data Management Advertising Recovery Router Robot Society Sports Office 365 Retail Google Wallet Spam Saving Money Information Technology Running Cable Analytics intranet Windows 8 Internet of Things Lithium-ion battery IT Services Managed IT services Hosted Solution Windows XP Artificial Intelligence Documents Social Networking Tech Support Compliance Bluetooth Public Speaking Drones Social IP Address Virtualization Printer Browser Automation Virtual Desktop Wireless Memory Government Unified Communications Securty Augmented Reality Keyboard Deep Learning User Document Management Encryption Search SaaS VoIP BDR Hard Drives Law Enforcement
QR-Code