Botnets responsible for majority of malicious web traffic

Date:

Title: Botnets Responsible for Majority of Malicious Internet Traffic, Reveals Report

According to a recent research report by cybersecurity experts from Trustwave, botnets are accountable for almost all malicious activity on the internet. The researchers analyzed an extensive amount of data from over 38,000 unique IP addresses, including 1,100 different payloads used in attacks. Their findings indicate that approximately 19% of recorded web traffic is malicious, with botnets responsible for over 95% of this malevolent activity during the six-month period analyzed, which ended in May of this year.

Among numerous botnets, a few notable ones stood out as leading contributors to exploit attempts. The Mirai, Mozi, and Kinsing botnets accounted for 95% of recorded exploits conducted via either HTTP or HTTPS protocols. These harmful malware families predominantly target vulnerabilities in Internet of Things (IoT) devices, seeking to compromise and assimilate them into their botnets.

To exploit these vulnerabilities, botnets leverage web shells, allowing them access to targeted endpoints and enabling further malicious actions. To protect themselves, businesses must prioritize robust security measures, including regular patch updates, strong access controls, frequent network security assessments, and constant monitoring of network traffic for any suspicious activities.

Regardless of size, location, or industry, businesses have always been attractive targets for cybercriminals. Botnets pose a significant threat as they can be utilized for a wide range of malicious activities, including distributed denial of service (DDoS) attacks, cryptocurrency mining, credential theft, and sensitive data exfiltration. With access to thousands of internet-connected devices, threat actors can overwhelm a single target with a massive influx of traffic, rendering their services inaccessible.

See also  Generative AI Set to Revolutionize Food and Beverage Industry: Info-Tech Research

Furthermore, botnets can install cryptominers, such as the infamous XMRig, on compromised devices. By exploiting the device’s computing power, electrical resources, and internet bandwidth, criminals profit from cryptocurrency mining while leaving victims with unusable machines and inflated energy bills.

One of the most prevalent botnets is Mirai, first discovered by cybersecurity researchers back in 2016. Mirai has since grown into a powerful botnet with over 500,000 devices under its control. It primarily targets IoT devices running on Linux operating systems.

Although law enforcement has made some arrests related to Mirai, the botnet’s code survived and has been adopted by other threat actors, ensuring its continued prevalence as a formidable threat to this day.

A recent report from SC Media highlights a concerning trend: the proportion of human traffic on the internet has reached its lowest level in eight years. Despite this, not all bot traffic is malicious, as many serve critical functions that allow the internet to function optimally. However, over the past year, malicious bots have become more sophisticated, especially with the emergence of tools like generative AI, making them more challenging to combat.

The report emphasizes that businesses must act swiftly and prioritize defending their premises against bot activity as it approaches 50% of all internet traffic. Failure to take appropriate measures puts organizations, their customers, and their reputations at risk.

In Germany, the situation is particularly troublesome, with nearly two-thirds of internet traffic in the country originating from bots, as per cybersecurity researchers at Imperva. This represents a significant increase compared to the previous year, while human-generated traffic proportionately decreased.

See also  AI Revolutionizing Healthcare: Transforming Costly System

In conclusion, the Trustwave research highlights the significant role botnets play in generating malicious internet traffic. As these botnets continue to evolve and pose a growing threat, businesses must remain vigilant by implementing robust security measures to protect their networks, devices, and sensitive data, safeguarding themselves and their customers from potential cyberattacks.

Frequently Asked Questions (FAQs) Related to the Above News

What is a botnet?

A botnet is a network of infected computers, also known as bots, that are controlled by a central command and control server. These infected computers can be used to carry out various malicious activities, such as distributed denial of service (DDoS) attacks, cryptocurrency mining, and data theft.

What percentage of web traffic is malicious?

According to the research report by Trustwave, approximately 19% of recorded web traffic is malicious.

Are botnets responsible for most of the malicious internet activity?

Yes, the research report states that botnets are responsible for over 95% of the recorded malicious activity on the internet.

Which botnets are the leading contributors to exploit attempts?

The Mirai, Mozi, and Kinsing botnets are identified as the leading contributors to exploit attempts, accounting for 95% of recorded exploits conducted via either HTTP or HTTPS protocols.

What do these botnets primarily target?

These botnets primarily target vulnerabilities in Internet of Things (IoT) devices.

How do botnets exploit vulnerabilities in IoT devices?

Botnets leverage web shells to gain access to targeted endpoints and carry out further malicious actions on vulnerable IoT devices.

How can businesses protect themselves against botnets?

Businesses can protect themselves by implementing robust security measures, including regular patch updates, strong access controls, frequent network security assessments, and constant monitoring of network traffic for any suspicious activities.

What are some of the malicious activities that botnets can carry out?

Botnets can carry out distributed denial of service (DDoS) attacks, cryptocurrency mining, credential theft, and sensitive data exfiltration.

How do botnets profit from cryptocurrency mining?

By exploiting the computing power, electrical resources, and internet bandwidth of compromised devices, botnets can mine cryptocurrency while leaving victims with unusable machines and inflated energy bills.

Can you provide an example of a prevalent botnet?

One of the most prevalent botnets is Mirai, which was first discovered in 2016. Mirai has grown into a powerful botnet with over 500,000 devices under its control, primarily targeting IoT devices running on Linux operating systems.

How have malicious bots evolved over time?

Malicious bots have become more sophisticated, especially with the emergence of tools like generative AI, making them more challenging to combat.

What happens if businesses fail to defend against bot activity?

Failure to take appropriate measures puts organizations, their customers, and their reputations at risk.

What is the proportion of human traffic on the internet?

According to a report, the proportion of human traffic on the internet has reached its lowest level in eight years.

Is all bot traffic malicious?

No, not all bot traffic is malicious. Many bots serve critical functions that allow the internet to function optimally. However, the proportion of malicious bots has been increasing.

Which country has a particularly high proportion of internet traffic originating from bots?

Germany has a particularly high proportion of internet traffic originating from bots, with nearly two-thirds of the traffic being attributed to bots.

What should businesses do to protect themselves from botnets?

Businesses should remain vigilant by implementing robust security measures to protect their networks, devices, and sensitive data. This includes staying up to date with security patches, implementing access controls, conducting regular network security assessments, and monitoring network traffic for suspicious activities.

Please note that the FAQs provided on this page are based on the news article published. While we strive to provide accurate and up-to-date information, it is always recommended to consult relevant authorities or professionals before making any decisions or taking action based on the FAQs or the news article.

Advait Gupta
Advait Gupta
Advait is our expert writer and manager for the Artificial Intelligence category. His passion for AI research and its advancements drives him to deliver in-depth articles that explore the frontiers of this rapidly evolving field. Advait's articles delve into the latest breakthroughs, trends, and ethical considerations, keeping readers at the forefront of AI knowledge.

Share post:

Subscribe

Popular

More like this
Related

Obama’s Techno-Optimism Shifts as Democrats Navigate Changing Tech Landscape

Explore the evolution of tech policy from Obama's optimism to Harris's vision at the Democratic National Convention. What's next for Democrats in tech?

Tech Evolution: From Obama’s Optimism to Harris’s Vision

Explore the evolution of tech policy from Obama's optimism to Harris's vision at the Democratic National Convention. What's next for Democrats in tech?

Tonix Pharmaceuticals TNXP Shares Fall 14.61% After Q2 Earnings Report

Tonix Pharmaceuticals TNXP shares decline 14.61% post-Q2 earnings report. Evaluate investment strategy based on company updates and market dynamics.

The Future of Good Jobs: Why College Degrees are Essential through 2031

Discover the future of good jobs through 2031 and why college degrees are essential. Learn more about job projections and AI's influence.