CatDDOS Threat Groups Sharply Ramp Up DDoS Attacks

CatDDOS Threat Groups Sharply Ramp Up DDoS Attacks

May 28, 2024 at 05:28PM

A recent surge in Mirai DDoS botnet variant, CatDDoS, has targeted organizations globally. Multiple gangs have exploited at least 80 vulnerabilities, affecting various technologies and products. The threat remains active and has compromised over 300 targets per day. DDoS attacks, primarily targeting individual computers and servers, continue to grow in size and complexity.

Based on the meeting notes, here are the key takeaways:

1. There has been a recent surge in activity involving a Mirai distributed denial-of-service (DDoS) botnet variant called CatDDoS, targeting organizations across multiple sectors in the US, France, Germany, Brazil, and China.

2. The malware first surfaced last August and resurfaced as a significant threat in September 2023. After dropping largely out of sight in December, multiple gangs using CatDDoS variants have been observed during the past three months, exploiting at least 80 different vulnerabilities in their new campaign.

3. The vulnerabilities being exploited under the CatDDoS umbrella affect many products and technologies, including Apache ActiveMQ Servers, Apache Log4j, Cisco Linksys, Jenkins servers, and NetGear routers. These vulnerabilities include both recent and older ones, such as CVE-2010-2506, CVE-2013-1599, and CVE-2011-5010.

4. CatDDoS actors have been compromising more than 300 targets per day in the latest wave of attacks, and the variants observed appear to be based on source code publicly released in December.

5. DDoS malware and botnets remain a potent threat, with threat actors focusing on individual computers and servers, leading to a 233% growth in the size of individual attacks in 2023.

These takeaways summarize the key points from the meeting notes regarding the surge in CatDDoS activity and the evolving threat landscape for DDoS attacks.

Full Article