Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Cyber Vandalism Exposed: DDoS Attack Trends in Crypto, Gaming & Environmental Sectors

Truth in IT
03/25/2024
77
1 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett: One of the things that I found interesting, you said, you know, just said that, you know, smaller and smaller people can have more and more effect, like smaller, smaller hacker. And you Scriptkitties you mentioned some other things. Uh, what what, uh, what does it take to create a botnet? What does it create? What does it take to to actually get one out there? Because we keep hearing, you know, these big stories about, hey, we took down this million user botnet and blah, blah, blah. It doesn't seem to have any effect. What does it take to build one? Omer Yoachimik: But so the let there's two avenues to this. Um, one avenue is, um, to well, let's let's break it down into the types of botnets. You can have an IoT based botnet that's built of, like, small devices, like, you know, cam smart cameras, for example. Um, and then you have a VM based botnet, virtual machine based botnet, which is what we're seeing more and, uh, virtual machines, very powerful, a lot of bandwidth, a lot of computational power. Um, IoT devices, very small. Um, low energy, low computation, low bandwidth. And so in the past, what we saw with botnets like Mirai, for example, um, this was a very famous botnet that we're still seeing attacks from, uh, from variants of it because the source code of it was, uh, leaked. Uh, and so, um, if if you want to create an IoT and I'm not encouraging anyone to do this because it is illegal, but, um, to form an IoT based botnet, you basically need to, um, create, uh, write malware that propagates and infects those devices, takes over them. And then you need a command and control server that gives them instructions. Um, then you can do the same thing with virtual machines. You'd probably need a few, uh, stolen credit cards, bogus accounts. Um, and, um, then you have yourself a VM based botnet.
  1. Summary: Discover the latest trends in DDoS attacks targeting cryptocurrency, gaming, and surprisingly, environmental services. Learn how attackers exploit industry vulnerabilities for financial or competitive gain, while evolving tactics to avoid detection. This insightful analysis unravels the motives and methods behind cyber vandalism, a critical watch for IT professionals to safeguard their digital landscapes.
Categories:
  • » Cybersecurity » Backup & Recovery
  • » Cybersecurity
  • » Cloud
  • » Data Management » Converged Infrastructure
Channels:
  • Prevent Botnets, DDoS and other Cyber-Vandalism with Cloudflare
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • cloudflare
  • ddos
  • security
  • networking
  • cloud
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Cyber Vandalism Exposed: DDoS Attack Trends in Crypto, Gaming & Environmental Sectors

            Upcoming Spotlight Events

            • Sep
              11

              An Executive’s Guide to Secure AI Adoption

              09/11/202501:00 PM ET
              More events

              Upcoming 360 View Events

              • Sep
                25

                360View: Email Security & Social Engineering Defense

                09/25/202512:00 PM ET
                • Oct
                  23

                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                  10/23/202512:00 PM ET
                  • Nov
                    20

                    360View: Budget Optimization: Doing More with Less

                    11/20/202512:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Aug
                      19

                      CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective

                      08/19/202512:00 PM ET
                      • Aug
                        21

                        Risk in Real Time: Visibility Into Cloud Based Vulnerabilities

                        08/21/202511:00 AM ET
                        • Aug
                          25

                          Harnessing AI to Transform the Landscape of Data Security

                          08/25/202510:55 AM ET
                          More events

                          Recent Industry Events

                          • Aug
                            13

                            Understanding the Limitations of WAFs and API Gateways Against Modern Threats

                            08/13/202501:00 PM ET
                            • Jul
                              23

                              Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                              07/23/202501:00 PM ET
                              • Jul
                                10

                                Discover the Latest Features of Netwrix 1Secure for MSPs

                                07/10/202501:00 PM ET
                                More events

                                Upcoming Events Calendar

                                • 08/19/2025
                                  12:00 PM
                                  08/19/2025
                                  CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective
                                  https://www.truthinit.com/index.php/channel/1401/cmmc-2-0-insights-understanding-compliance-from-an-expert-auditors-perspective/
                                • 08/21/2025
                                  11:00 AM
                                  08/21/2025
                                  Risk in Real Time: Visibility Into Cloud Based Vulnerabilities
                                  https://www.truthinit.com/index.php/channel/1372/understanding-dynamic-risk-management-in-real-time-environments/
                                • 08/25/2025
                                  10:55 AM
                                  08/25/2025
                                  Harnessing AI to Transform the Landscape of Data Security
                                  https://www.truthinit.com/index.php/channel/1381/harnessing-ai-to-transform-the-landscape-of-data-security/
                                • 08/26/2025
                                  10:55 AM
                                  08/26/2025
                                  Confronting AI’s Challenges: Insights into CISOs' Biggest Concerns
                                  https://www.truthinit.com/index.php/channel/1380/confronting-ai-s-challenges-insights-into-cisos-biggest-concerns/
                                • 08/26/2025
                                  01:00 PM
                                  08/26/2025
                                  Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats
                                  https://www.truthinit.com/index.php/channel/1404/renown-health-secures-10k-mailboxes-stops-1m-in-email-threats/
                                • 08/27/2025
                                  10:55 AM
                                  08/27/2025
                                  Mastering Secure AI Implementation: A Comprehensive Executive Guide
                                  https://www.truthinit.com/index.php/channel/1379/mastering-secure-ai-implementation-a-comprehensive-executive-guide/
                                • 08/28/2025
                                  10:55 AM
                                  08/28/2025
                                  A Practitioner’s Roadmap for Safeguarding AI Implementation in Organizations
                                  https://www.truthinit.com/index.php/channel/1378/a-practitioner-s-roadmap-for-safeguarding-ai-implementation-in-organizations/
                                • 08/29/2025
                                  10:55 AM
                                  08/29/2025
                                  Ethical Frameworks and Compliance Strategies for Safe AI Implementation
                                  https://www.truthinit.com/index.php/channel/1377/ethical-frameworks-and-compliance-strategies-for-safe-ai-implementation/
                                • 09/11/2025
                                  01:00 PM
                                  09/11/2025
                                  An Executive’s Guide to Secure AI Adoption
                                  https://www.truthinit.com/index.php/channel/1374/an-executives-guide-to-secure-ai-adoption/
                                • 09/16/2025
                                  01:00 PM
                                  09/16/2025
                                  Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
                                  https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
                                • 09/25/2025
                                  12:00 PM
                                  09/25/2025
                                  360View: Email Security & Social Engineering Defense
                                  https://www.truthinit.com/index.php/channel/930/360view-email-security-social-engineering-defense/
                                • 10/23/2025
                                  12:00 PM
                                  10/23/2025
                                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                                  https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
                                • 11/20/2025
                                  12:00 PM
                                  11/20/2025
                                  360View: Budget Optimization: Doing More with Less
                                  https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
                                • 12/18/2025
                                  12:00 PM
                                  12/18/2025
                                  360View: 2026 IT Predictions & Emerging Trends
                                  https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
                                Truth in IT
                                • Sponsor
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Preference Management
                                Desktop version
                                Standard version