macOS

Dutch Police Seized Bulletproof Hosting Used to Control DDoS Botnets

Dutch police have taken down five servers offline that used to control botnet service, all the hardware was seized and actors behind the service were arrested.

National Criminal Investigation tracked down the location of the server and then Dutch police arrived at the hosting company data center in Amsterdam and the servers were taken offline

“A 24-year-old man from Veendam and a 28-year-old man from Middelburg were arrested on Tuesday evening. They are suspected of, among other things, computer breach and the spread of malware,” reads the report.

The Bulletproof hosting service provides services to Cybercriminals for hosting malware, botnets, and other illicit services. In this case, the taken down servers used to control botnets that mainly includes Internet-of-Things (IoT) devices.

These bots continuously scan other vulnerable IoT devices, if any vulnerability detected then they deploy malware on the devices to gain control over the devices and they are used to conduct DDoS attacks.

“Bringing these servers offline to the bulletproof hoster is a blow to an infrastructure that carried out attacks worldwide. This makes it impossible to control the existing Mirai botnet and prevent infections of new devices by this botnet.”

According to the Gartner report in 2020 more than 20 billion IoT in use worldwide, it tremendously expands the attack surface for the attackers. Most of these are with factory passwords and lack of general security.

The IoT botnets are a collection of devices such as cameras, routers, DVRs, wearables and other embedded technologies, infected with malware.

Nowadays IoT devices emerge as a prime target for hackers because they are poorly maintained, default passwords, 24/7/365 availability, low-security standards.

You can follow us on LinkedinTwitterFacebook for daily Cyber Security and hacking news updates.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Cactus Ransomware Exploiting Qlik Servers Vulnerability

The Cactus ransomware gang has been exploiting vulnerable Qlik sense servers ever since November 2023…

1 day ago

Hackers Abuse Autodesk Drive For Hosting Weaponized PDF Files

Autodesk Drive is a data-sharing platform for organizations to share documents and files in the…

1 day ago

MuddyWater Hackers Abusing Legitimate RMM Tool to Deliver Malware

The Iranian state-sponsored threat actor MuddyWater has been observed exploiting a legitimate remote monitoring and…

1 day ago

Hackers Actively Exploiting WP Automatic Updates Plugin Vulnerability

Hackers often target WordPress plugins as they have security loopholes that they can exploit to…

1 day ago

Microsoft Releases Historical MS-DOS 4.0 Source Code to the Public

In a significant move for tech enthusiasts and historians alike, Microsoft has made the source…

1 day ago

PoC Exploit Released For Critical Flowmon Vulnerability

Progress addressed a critical vulnerability last week, which was associated with an unauthenticated Command injection…

1 day ago