{"id":32469,"date":"2017-10-31T20:35:06","date_gmt":"2017-10-31T20:35:06","guid":{"rendered":"http:\/\/greenpages.com\/?p=7278"},"modified":"2017-10-31T20:35:06","modified_gmt":"2017-10-31T20:35:06","slug":"grim-reaper-botnet-could-come-for-your-candy","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/grim-reaper-botnet-could-come-for-your-candy\/","title":{"rendered":"Grim \u2018Reaper\u2019 Botnet Could Come for Your Candy"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7279\" src=\"https:\/\/greenpages.com\/wp-content\/uploads\/Grim-Reaper-Botnet-Could-Come-for-Your-Candy.png\" alt=\"'Reaper' Botnet\" width=\"695\" height=\"391\" srcset=\"http:\/\/2l3rco36shq61mkrawkdr24u.wpengine.netdna-cdn.com\/wp-content\/uploads\/Grim-Reaper-Botnet-Could-Come-for-Your-Candy.png 560w, http:\/\/2l3rco36shq61mkrawkdr24u.wpengine.netdna-cdn.com\/wp-content\/uploads\/Grim-Reaper-Botnet-Could-Come-for-Your-Candy-260x146.png 260w\" sizes=\"auto, (max-width: 695px) 100vw, 695px\" \/><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><em>By Tony Ramsey, Practice Manager, Networking &amp; Security<\/em><\/p>\n<p class=\"p1\"><span class=\"s1\">IoT devices and gadgets which are the primary target of the &#8216;Reaper&#8217; botnet present a new attack vector and easy-to-exploit vulnerabilities.\u00a0<\/span><span class=\"s1\">These vulnerabilities. coupled with the number of IoT devices, have certainly helped the &#8216;Reaper&#8217; botnet reach the critical mass needed to deliver a massive DDoS attack or a crippling payload to its victims. But don&#8217;t fret, it hasn&#8217;t done so yet. When compared to the Mirai botnet attack last year, the good news is that security experts are more prepared for it.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The major concern is the sheer number of infected devices and their combined computing power harnessed by botnet controllers through injection of malicious code that has the potential to cause massive problems.\u00a0<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The numbers provided by 360 Netlab are impressive:<\/span><\/p>\n<h3 class=\"p1\"><span class=\"s1\"><b>Infected bots connected to\u00a0one controller: About 28,000 infected devices<\/b><\/span><\/h3>\n<h3 class=\"p1\"><span class=\"s1\"><b>Number of devices vulnerable to &#8216;Reaper&#8217; botnet: As far as two million<\/b><\/span><\/h3>\n<p class=\"p1\"><span class=\"s1\">It\u2019s important to note, however, that this botnet has already lost the element of surprise. The &#8216;Reaper&#8217; botnet controllers and some of its code are now known to the internet security community. Its method of infection: exploiting known vulnerabilities and its propagation between devices are also being analyzed.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Therefore, it is no longer a question of detection but prevention.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This is certainly the time for device vendors to provide security patches for hardware and software platforms to address the specific exploitable vulnerabilities.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">There\u2019s much anxiety in the internet security community since we\u2019ve not yet seen any attacks or malicious activity and the Reaper botnet still seems to be in the expansion phase; its intention for a concerted malicious attack is yet unknown, but we know that its potential magnitude of damage is quite large.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Some of the infected networked devices are mainly for home and SOHO use, so education and awareness is needed by consumers who aren\u2019t necessarily accustomed to applying security patches and in-depth configurations for threat mitigation.<\/span><\/p>\n<h4 class=\"p1\"><span class=\"s1\"><b>&#8216;Reaper&#8217; Botnet Update:<\/b><\/span><\/h4>\n<p class=\"p1\"><span class=\"s1\">The original claim in the security world that this is one of the largest botnet infections ever has been significantly reduced. As of today,<a href=\"http:\/\/www.zdnet.com\/article\/reaper-botnet-experts-reassess-size-and-firepower\/\"  rel=\"noopener\"> the prediction<\/a> is that the &#8216;Reaper&#8217; botnet isn&#8217;t as far reaching\u00a0as expected, but it could change at any moment. The question is, will the &#8216;Reaper&#8217; botnet cause more widespread damage than the infamous Mirai?<\/span><\/p>\n<p>&nbsp;<\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=rrDnJj5UnCA:tpxGs_lfYpA:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=rrDnJj5UnCA:tpxGs_lfYpA:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?i=rrDnJj5UnCA:tpxGs_lfYpA:-BTjWOF_DHI\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=rrDnJj5UnCA:tpxGs_lfYpA:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?i=rrDnJj5UnCA:tpxGs_lfYpA:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=rrDnJj5UnCA:tpxGs_lfYpA:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/JourneyToTheCloud\/~4\/rrDnJj5UnCA\" height=\"1\" width=\"1\" alt=\"\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; By Tony Ramsey, Practice Manager, Networking &amp; Security IoT devices and gadgets which are the primary target of the &lsquo;Reaper&rsquo; botnet present a new attack vector and easy-to-exploit vulnerabilities.&nbsp;These vulnerabilities. coupled with the number of IoT devices, have certainly helped the &lsquo;Reaper&rsquo; botnet reach the critical mass needed to deliver a massive DDoS attack&#8230;  <a href=\"http:\/\/greenpages.com\/featured\/reaper-botnet-coming\/\" title=\"ReadGrim &lsquo;Reaper&rsquo; Botnet Could Come for Your Candy\">Read more &raquo;<\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5397,3303,179,1546,3327],"tags":[],"class_list":["post-32469","post","type-post","status-publish","format-standard","hentry","category-botnet","category-cyber-security","category-featured","category-it-security","category-networking-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/32469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=32469"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/32469\/revisions"}],"predecessor-version":[{"id":32470,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/32469\/revisions\/32470"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=32469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=32469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=32469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}