Researcher claims to expose identity of Mirai Botnet Author

Share if you likedShare on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn0

Famous infosec journalist Brian Krebs, had a website KrebsOnSecurity and it was targeted with a massive attack of Mirai botnets to launch a huge DDoS attack in October 2016. He has managed to identify the criminal. Looks like Brian Krebs has been working hard to find the creator of Mirai botnet that has become a huge online security threat by compromising a huge number of Internet of Things (IoT) devices and creating a series of infected botnets.

Krebs started investigating to find the identity of the person after his website went down for four straight days due to a massive attack with up to 665 Gbps data traffic. Kerbs wanted to find out who that was and who is responsible for the attack. There are many more attacks on high-profile organisations including DynDNS. According to the Krebs, his analysed “hundreds of hours of research” as he was “desperately seeking the missing link between seemingly unrelated people and events.”

He stated that the majority of DDoS attacks were launched to make quick money. For example, a company which offers DDoS protection may want to launch DDoS attacks on certain targets so that they get will be convinced about the dangers of not taking their service and then hire them for DDoS protection.

In his opinion, the very same thing happened to his website and many other big websites such as Deutsche Telekom and French hosting service provider OVH that were attacked with Mirai malware by the use of hundreds and thousands of botnets in 2016.

Now the most important revelation; Who was behind the attack on Krebs website?

As per Krebs research, Protraf Solutions owner Paras Jha is responsible for recent attacks involving Mirai botnets, including the attack on his website krebsOnSecurity. Protraf Solutions is a DDoS protection service provider firm.

source: hackread

Share if you likedShare on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn0

Leave a Reply