Hackers Place Monero Ransom Demands Inside DDoS Traffic

Hackers Place Monero Ransom Demands Inside DDoS Traffic

After several months of calm, DDoS hackers became active again and began to destroy websites. Recently, attackers have carried out a number of attacks using a new method of overloading victims' servers with fake traffic. To make attacks more powerful, hackers began using servers that help speed up sites - CDN servers for distributed caching in RAM.

The largest attack of this kind was repelled on February 28 by Github, a web service for hosting IT projects and their joint development. The power of the attack reached 1.35 TB of data per second, and in recent attacks, attackers began adding ransom demands to the array of attack traffic.

Such demands are not new, but previously ransomware only used email campaigns; demands in incoming traffic are another unpleasant surprise. In fact, the attack includes phishing, elements of a DDoS attack, and extortion. 

Security experts at Akamai, which helped fend off the Github attack, told Fortune that the hackers were demanding a ransom in Monero (XMR). It looked like this: “Pay_50_XMR_to the address” and the address of the digital wallet.

As Lisa Beagle, senior manager of the Akamai security service, comments on the situation, this is the first time the team has encountered such an attack.

Akamai specialists do not know whether any of the victims transferred currency to the ransomware account or not. Since Monero requires ransom, it is more difficult to monitor transactions. Moreover, it is more difficult even for the hackers themselves to understand which of the victims paid them. 

Paying the required ransom is not the best idea, since this does not guarantee the emergence of new lovers of easy money and does not at all guarantee that the attackers, having received theirs, will stop attacks.

Akamai experts give disappointing forecasts and claim that the attacks will not stop.

According to http://fortune.com

You May Also Like

32018-05-18

WinstarNssmMiner is a new dangerous virus for hidden mining

At this stage in the development of cryptocurrencies, creating and distributing malware that uses your computer's CPU while you are visiting web pages or watching YouTube videos has become a popular practice. This practice even got its own name - cryptojacking. Typically, these malware (which are often used to mine Monero) stop working when you close your browser.

Security
02018-11-22

21-year-old hacker stole more than a million dollars from businessmen

According to the New York Times, on November 20, Manhattan police arrested 21-year-old Nicholas Truglia, who hacked other people's mobile phones in order to appropriate the owners' cryptocurrency.

Security,

Latest articles from Security category

Fresh video on our Channel