¶ … Pony Botnet attack. Details about the attack, resolutions, and concerned parties will be studied.
Background/Hacking
Botnets can be loosely described as a collection of interconnected compromised devices, known as 'zombies', synchronously working with compromised devices to execute malicious tasks. Zombies are not self-directed like internet worms; they need proper direction to carry out a particular function. Zombies can be transmitted by a variety of channels for instance, an Internet Relay Chat (IRC) channel, from where the commands are sent by a master channel by these zombies (Jermyn et.al, 2014). Some typical botnet tasks include mass spamming a company's email address. One email address could be attacked by numerous zombie devices instigating a denial of service.
In case of smartphones, botnets can cause potential damage to cellular network infrastructure because they have firm hierarchical dependencies; therefore, they would be unable to counter this cyber-attack. The recent academic work based on mass botnet attacks against cellular networks is comprised of two categories. Apart from that, core internet services such as BGP (Border Gateway Protocall) and DNS (Domain Name System) can also be targeted. As of yet, botnet attacks are limited to desktop computers. However, during recent years, given the soaring popularity of Smartphone devices, Smartphone-based botnets have also risen considerably.
Researchers noticed the lack of authentication required for traffic signaling in cellular networks. This could cause considerable damage if an attacker connects to the network (Jermyn et.al, 2014).
Experiments were conducted to ascertain whether a similar amount of damage is conceivable by a collection of compromised wireless devices attempting to saturate the cellular network, and using these compromised devices for spam attacks on websites. The threats mentioned are concrete and easier to implement on cellular networks by developing a botnet for smartphones.
Pony Botnet
A new wave of cyber-attacks known as 'Pony' has attacked thousands of computers with the intention of stealing bitcoin and electronic money. This is the biggest and the most elaborate cyber-attack on electronic money yet, as per Trustwave's findings. According to Trustwave's findings, the architects of the Pony botnet cyber-attack have already stolen 85 online wallets containing bitcoins and other variations of online money (Pony Botnet Steals). The company was not aware of the exact amount containing in the wallets.
Trustwave's findings emerged after a fresh wave of cyber-attacks was launched on bitcoin websites. The attack compelled three online currency companies to freeze withdrawals, resulting in a plunge in the bitcoin's value to 33% during three weeks period. Bitcoin is a new form of digital currency developed by a team of programmers. No single person and/or company governs bitcoin; its value is purely based on user demand (Pony Botnet Steals). People trading in bitcoins can store their money in online wallets on their computers and/or companies offering storage services. Mining for bitcoins is a time-consuming task, as computers work with complex mathematical computations.
The botnet operators are committing electricity theft and consuming data center resources as they exploit the compromised devices to search for digital money. Trust wave discovered 2 million passwords stolen from websites such as Facebook, Twitter, Google, and Yahoo, as it worked with a primitive version of Pony malware while investigating a command-and-control server. Trustwave reported that another 600 accounts were compromised by the latest Pony derivative. Twitter and Facebook representatives have changed passwords of their hacked users. A spokeswoman from Google declined to comment; Yahoo representatives were unavailable also (Cyber Experts Uncover).
Reuters was informed by Trustwave that it had informed the major 90,000 websites and internet service providers about its findings on the server. This accumulated data consists of 326,000 Facebook accounts, 60,000 Google accounts, 59,000 Yahoo accounts and 22,000 accounts from Twitter as per Spider Labs (Cyber Experts Uncover).
The majority of the affected users belonged to America, Singapore, Germany and Thailand, and some other countries. The authorities in Netherlands were contacted by Spider Labs, requesting them to shut down the Pony bot server. As per Spider Labs findings, most of the passwords consisted of '123456', used in approximately 16,000 accounts. Other vague passwords included: 'Password';'
1'; '123'; and 'Admin'.
It has been seen many times that many people use simple logins and passwords, and use them on multiple accounts without realizing that they are too simple to provide security. Learning not to use easy passwords is a responsibility of users.
Bitcoin is a digital currency sustained by software code written by an unknown programmer or group of programmers. It is not governed by any one company or person, and its value is determined by user demand. People who buy digital currency can store it in virtual wallets on their own machines or with companies...
Technology in Film Fred Ott was the very first movie star that every existed. His brief starring role in the five-second film that showed him sneezing started the use of technology to make films. Since then, technology both in and out of film has changed immeasurably and what technology is used and is said about technology in these same films has evolved quite a lot and the statements sometimes made are
Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to
These benefits arise because of implementing both assistive technologies and Information Communication technology (ICT). The implementation of technology in classrooms usually has benefits to both the disabled students as well as the teachers (Kirk, Gallagher, Coleman, & Anastasiow, 2012, p.240). The general benefits of use of assistive technologies and ICT in teaching students with learning disabilities include greater learner autonomy and unlocking hidden potential with those with communication difficulties.
Instead, organizations must strike a balance between the autonomy and independence offered by technology in the workplace and the need for employees to have some level of formal and informal commitment to the organization as a whole. Just as seemingly counterproductive activities such as doodling, daydreaming, or, in the information age, surfing the internet, can actually contribute to efficiency by offering employees productive mental stimulation, so too can the
Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see
Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now