network background popup

DDoS Blog

Bash Vulnerability AKA Shellshock

September 24th 2014 marked the announcement of a remote code execution vulnerability(CVE-2014-6271) for the Linux Bourne-Again SHell (BASH). Since vulnerability announcements are a daily occurrence, how much should you be concerned?The answer is very.There are three factors you need to consider:How [...]

Sep 24th 2014

Are your servers secure from hackers

As the Reuters headline read this week“Hackers break into server for Obamacare website”It was about hackers who uploaded malicious code onto a development server, which is part of ObamaCare. The code installed on the government website was said to be part of a larger operation and used primarily[...]

Sep 4th 2014

Top Ten Hosting/ISP’s with servers infected by Brobot

Since our run-in with Brobot a couple of weeks ago (See blog piece). We have had some requests to see if we had a list of what IPs are being used by Brobot. We do have a list of the offending IPs and its in the thousands, no surprise given its total power and to operate within TCP port 80 parameters[...]

Jul 10th 2014

The Statistics of DDoS attacks

I remember the first time I sat down in a statistics class at Concordia University in Montreal as it was a requirement for my undergrad Science degree, so I was there by force, so to speak. The professor entered the room, told us his name and a little about his professional background. Once the intr[...]

Jul 8th 2014

Not All Botnets Are Treated Equally……..Brobot Still Has Some Serious Juice!

Last week we had a run in with the notorious Brobot Botnet, if the name sounds familiar it’s because this bot was responsible for sporadic outages on a number of large US based financial institutions in 2013. Said to be operated by al-Qassam Cyber Fighters (AKA QCF).Botnets are born, die, grow, sh[...]

Jun 25th 2014

DOSarrest Systems fully patched for CVE-2014-0224 MITM OpenSSL Flaw

On June 5th, the OpenSSL project announced CVE-2014-0224, a vulnerability that enabled man-in-the-middle-attacks (MITM) and potentially allowed for the decryption and modification of data communication between client and server. A quick audit was ran by the DOSarrest team, and a subsequent set of up[...]

Jun 10th 2014

Testing Your Servers for the Heartbleed Vulnerability

What’s the Heartbleed bug? How does it work?On April 7th, 2014, a security vulnerability in the OpenSSL encryption software was revealed, which affects millions of servers around the world. The bug allows users to send a specially-crafted “heartbeat” packet to an affected server, requesting mo[...]

Apr 17th 2014

Impact of Heartbleed Vulnerability(CVE-2014-0160) and your DOSarrest Services

The engineering team at DOSarrest has conducted a full assessment of systems, in the wakeof April 7th’s disclosure of CVE-2014-0160, also known as Heartbleed.With security being our prime focus we immediately started auditing our systems once the alert became public.After a thorough investigation [...]

Apr 14th 2014
Click to view pdf

DOSarrest New System software release V3

After over 2 years of research, development and testing we have upgraded our backend software to a completely brand new (V3) release, this is our 3rd major release since 2008 and it’s a major upgrade from our older platform. There are so many new features available immediately and many more to com[...]

Apr 7th 2014

Facts And Tips On How To Stop DDoS Attacks

As with any news event its usually the largest, most deadly or crazy story that grabs the headlines and sometimes the story is covered 24/7 for weeks. You would think there was an out of control pandemic of Ebola about to sweep across the US, even though as of today there is only 2 confirmed cases o[...]

Mar 12th 2014

DDoS Article Categories