Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

YoyoDDos Bot Details Revealed On Blog Posting

Arbor Networks : 25 August, 2010  (Technical Article)
Arbor Networks details the latest Botnet called YoyoDDos which has claimed a number of victims with Distributed denial of service attacks
Arbor Networks has written a blog post - YoyoDDos a new family of DDos bots - which reveals details on new group of DDos bots called YoyoDDos that have already claimed 180 victims.

YoyoDDos botnets are a new family of DDos threats which attack by attempting to set up two TCP connections to victims IP addresses and then flood their machine with UDP packets. So far, the countries which have fallen victim include China, the US and South Korea, with the majority being located in China. 50% of all YoyoDDos bots do not exist at all in the virus totals database.

The post, written by Arbor's Jeff Edwards, says that Arbor's sandboxes first spotted the bots in May 2010 and since then over 70 specimens of the family have been discovered. Edwards provides detailed analysis on the bot's malcode properties, how they can be identified, and how they attack.

Jeff Edwards is a research analyst at Arbor and newly appointed to the ASERT team. Prior to this Edwards was a FBI Special Agent assigned to the Detroit Cybercrime Squad, where he investigated network intrusions, botnets, DDos attacks, and various other computer-related federal crimes. His background also includes an assignment to an FBI lab in Quantico, VA where his duties included forensic examinations, data recovery, and reverse engineering involving diverse kinds of digital evidence.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo