¶ … Pony Botnet attack. Details about the attack, resolutions, and concerned parties will be studied.
Background/Hacking
Botnets can be loosely described as a collection of interconnected compromised devices, known as 'zombies', synchronously working with compromised devices to execute malicious tasks. Zombies are not self-directed like internet worms; they need proper direction to carry out a particular function. Zombies can be transmitted by a variety of channels for instance, an Internet Relay Chat (IRC) channel, from where the commands are sent by a master channel by these zombies (Jermyn et.al, 2014). Some typical botnet tasks include mass spamming a company's email address. One email address could be attacked by numerous zombie devices instigating a denial of service.
In case of smartphones, botnets can cause potential damage to cellular network infrastructure because they have firm hierarchical dependencies; therefore, they would be unable to counter this cyber-attack. The recent academic work based on mass botnet attacks against cellular networks is comprised of two categories. Apart from that, core internet services such as BGP (Border Gateway Protocall) and DNS (Domain Name System) can also be targeted. As of yet, botnet attacks are limited to desktop computers. However, during recent years, given the soaring popularity of Smartphone devices, Smartphone-based botnets have also risen considerably.
Researchers noticed the lack of authentication required for traffic signaling in cellular networks. This could cause considerable damage if an attacker connects to the network (Jermyn et.al, 2014).
Experiments were conducted to ascertain whether a similar amount of damage is conceivable by a collection of compromised wireless devices attempting to saturate the cellular network, and using these compromised devices for spam attacks on websites. The threats mentioned are concrete and easier to implement on cellular networks by developing a botnet for smartphones.
Pony Botnet
A new wave of cyber-attacks known as 'Pony' has attacked thousands of computers with the intention of stealing bitcoin and electronic money. This is the biggest and the most elaborate cyber-attack on electronic money yet, as per Trustwave's findings. According to Trustwave's findings, the architects of the Pony botnet cyber-attack have already stolen 85 online wallets containing bitcoins and other variations of online money (Pony Botnet Steals). The company was not aware of the exact amount containing in the wallets.
Trustwave's findings emerged after a fresh wave of cyber-attacks was launched on bitcoin websites. The attack compelled three online currency companies to freeze withdrawals, resulting in a plunge in the bitcoin's value to 33% during three weeks period. Bitcoin is a new form of digital currency developed by a team of programmers. No single person and/or company governs bitcoin; its value is purely based on user demand (Pony Botnet Steals). People trading in bitcoins can store their money in online wallets on their computers and/or companies offering storage services. Mining for bitcoins is a time-consuming task, as computers work with complex mathematical computations.
The botnet operators are committing electricity theft and consuming data center resources as they exploit the compromised devices to search for digital money. Trust wave discovered 2 million passwords stolen from websites such as Facebook, Twitter, Google, and Yahoo, as it worked with a primitive version of Pony malware while investigating a command-and-control server. Trustwave reported that another 600 accounts were compromised by the latest Pony derivative. Twitter and Facebook representatives have changed passwords of their hacked users. A spokeswoman from Google declined to comment; Yahoo representatives were unavailable also (Cyber Experts Uncover).
Reuters was informed by Trustwave that it had informed the major 90,000 websites and internet service providers about its findings on the server. This accumulated data consists of 326,000 Facebook accounts, 60,000 Google accounts, 59,000 Yahoo accounts and 22,000 accounts from Twitter as per Spider Labs (Cyber Experts Uncover).
The majority of the affected users belonged to America, Singapore, Germany and Thailand, and some other countries. The authorities in Netherlands were contacted by Spider Labs, requesting them to shut down the Pony bot server. As per Spider Labs findings, most of the passwords consisted of '123456', used in approximately 16,000 accounts. Other vague passwords included: 'Password';'
1'; '123'; and 'Admin'.
It has been seen many times that many people use simple logins and passwords, and use them on multiple accounts without realizing that they are too simple to provide security. Learning not to use easy passwords is a responsibility of users.
Bitcoin is a digital currency sustained by software code written by an unknown programmer or group of programmers. It is not governed by any one company or person, and its value is determined by user demand. People who buy digital currency can store it in virtual wallets on their own machines or with companies...
The finance world is finally abuzz with news of bitcoin and other cryptocurrency. What are cryptocurrencies, and what do potential investor need to know about them? This bitcoin essay offers a brief background of bitcoin and other cryptocurrencies, also referring to the blockchain software that underlies them. Then, this bitcoin essay explores what financial analysts say about the viability of bitcoin as an investment. Finally, this essay will how and
Money functions as a placeholder in any economic system; it does not have value outside of what its users place in it as a system of exchange. As noted by Asmundson & Oner (2012), the creation of money is one of the most significant developments in human civilization. Without money, human beings would be reduced to bartering for goods and services. While this may be feasible on a small-scale, community
Bitcoin Explain the Functions of Money Money as a Means of Exchange This is a vital function of money in an economy because without money, the only way of exchanging goods and services would be by means of barter, which implies a direct exchange of one commodity for another. The economies we line in are monetary economies in which most of the goods and services produced are exchanged via the intermediary of money,
Business Proposition for Opening a BTC-Gold Exchange in Palestine The world economy is fast increasingly unstable as social issues such as massive migrations, economic issues such as crushing national debts, and political issues that are leading to threats of war among many nations, are becoming more and more apparent with every passing day. To protect against these issues, investors seek alternatives. Bitcoin (BTC) and gold both present themselves as exceptional stores
Cryptocurrency A cryptocurrency is a medium of exchange (currency) that is digital in form, non-governmental, and relies on cryptography for its security (Investopedia, 2018). It is the latter component of the definition that gives cryptocurrency its name. The vast majority of currency in the world comes in the form of exchangeable units that are issued and have their value controlled by governments. Nations will either allow their currency to float freely
Bitcoin: Disruptive Technology and TerrorismIntroductionThe advent of technology has brought about significant changes in various sectors of the economy, including finance, communication, and transportation. However, these advancements have also introduced new challenges, particularly in the realm of security. This paper examines the concept of Disruptive Innovation, with a focus on Bitcoin and its implications for terrorist financing. The importance of this topic lies in its relevance to contemporary global security
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now