IoT DDoS Botnet Offered by Gaming Company

0
197

The discoverers of JenX, Radware, reached the conclusion that botnet powers a DDos function called Corriente Divina. Based on the website’s costing, which is $16 and the consumers are able to rent GTA San Andreas multiplayer modded server for just $9. Moreover, if the users pay extra $20, they could be able to launch DDos attacks in the range of 300 Gbps. It is able to carry out Valve Source Engine Query along with 32 bytes DDos floods.
Elaborately, the researchers claimed that it is not only a new botnet, but it is a Frankenstein of sorts. As JenX was built by mixing various parts of IoT botnets, they know more about such methods.

JenX is more than meets the Eye

Although Satori and PureMasuta lend their malware to JenX, the new botnet is one of its kind because it operates from a centralized structure. Where other botnets depend on infected hosts in order to operate by scrutinizing other hosts. The researcher studying botnet claims that “The drawback of the central approach is a less than linear growth with the number of deployed servers. Much slower compared to the exponential growth rate of and less aggressive than distributed scanning botnets.”
One other problem by this new botnet is that the centralized method makes security terms look ridiculous like Radware to file legal requests. After Radware mentioned its report, it had obtained servers hosting the botnet. But the big problem is that the major command and control server are still operating.

A Threat to GTA Players Only

However, JenX appears to be no threat to Radware. The bad consequences are only present if you over-use the game. Only in GTA San Andreas multiplayer server you are likely to be distracted by the botnet. Although the attack is very specific, Geenens believe that JenX will be more activated in the future with more advanced botnets that could be very harmful.
Being in the what if state never leaves you comfortable as you feel you can be betrayed in a moment. The BickerBot, the botnet that targets poorly secured IoT devices, did the same thing within the Darknet. It started very inactive and stealthily became very active where it currently makes 12 attacks each and every day, which is a very threatening number. Such behavior proves that hackers are evolving based on the previous mistakes made and attempted by others.

Related Article: Arbitrary Code Resolved