You are viewing a single comment's thread from:

RE: Some very Fundamentals on Malware - [Kaspersky Lab]

in #cybersecurity6 years ago

the explanation was quite straightforward and made a lot of sense. Although I would really like to see more about use of malware for DDOS attacks. My reason for it is that I have this suspicion that most of the bandwidth the DDOS attackers use is probably rented rather than stolen.

Sort:  

That's interesting. Why would you suspect that? Since it's so easy to infect and spread malware, why would you think they'd be renting?

Although renting might not be the most anonymous way of doing it but I was actually thinking in terms of time. how long would it take for the requisite amount of machines to be laced with a malware - an amount that could effectively execute a DDOS.
What if I am that I guy and I am working on a limited time frame but with a decent budget. The easiest setup for a large operation would be to go for cheap location, buy mediocre hardware for back end and plug into the rented bandwidth from there and leave it there to do it's magic while I ghost out of there.
I know it's just a theory but somehow I find it a bit inefficient to wait for the right amount of machines to be online at the same time. How long does it takes for me to build a network like that? What if the number is low and the party on the other side becomes aware of my failed attempt and then uses even more precautions?
My suspicions arose from what if somebody is hellbent then they wont't leave it to chance. Maybe I am wrong........who knows.