Wirex Android DDoS Malware Adds UDP Flood
ATT&CK techniques detected
T1498.001Direct Network Flood
78%
“wirex android ddos malware adds udp flood an impressive recent collaboration among several security vendors resulted in a discovery and a timely reaction to a new android ddos thingbot dubbed wirex. as part of this joint effort, these vendors published a very good detailed report…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1498Network Denial of Service
64%
“wirex android ddos malware adds udp flood an impressive recent collaboration among several security vendors resulted in a discovery and a timely reaction to a new android ddos thingbot dubbed wirex. as part of this joint effort, these vendors published a very good detailed report…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1498Network Denial of Service
63%
“malware families, it still has quite a way to mature as an effective, full - fledged ddos bot. the attack execution routine is a bit different from most ddos malware families. to maintain a continuous flood of packets and better orchestration, usually there are two concurrent exe…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1498.001Direct Network Flood
52%
“malware families, it still has quite a way to mature as an effective, full - fledged ddos bot. the attack execution routine is a bit different from most ddos malware families. to maintain a continuous flood of packets and better orchestration, usually there are two concurrent exe…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
As quickly as attackers commandeer IoT devices to build more “thingbots,” they continue to evolve their attack types and functionality.