Have you ever thought of how hackers launched a DDoS attack? Do they buy a lot of computers or they are actually making use of your computer as their army for the attack? Before we move into this topic any further, I would like to take this opportunity to give a short introduction on DDoS.
DDoS, also known as Distributed Denial-of-Service attack is a method of unethical hacking where it will floods the target with a large amount of traffic until it is completely compromised. I really mean a large amount of traffic and this amount of traffic is not easily done with just a single computer. Hence hackers will use a lot of computers as their source of army to launch the attack. The question now is, how the hacker gain that kind of resources to start a DDoS attack? A recruitment drive?
Fake Java Update is the Recruitment Drive for DDoS Attack
Unfortunately, it is not only the Java update is used for a DDoS recruitment drive. If you read about recent news, the fake Adobe Flash player update is also used for this sort of thing. This sort of recruitment drive is a unwilling recruitment, or also known as a silent recruitment. You will not even notice that you are infected simply because a Trojan is not as harmful as a Virus because the purpose is not to harm your computer, but to make use of you as a weapon for their destruction or money making purposes.
The Backdoor.IRCBot.ADEQ is the fake Java udpate Trojan. It is extremely “contagious”, as it can be downloaded from a multitude of locations, most of them being legit websites that have been infected by the tool. The key strength of this Trojan is that it has a dedicated infection for each computer. On top of that, it can spread via P2P shared folder, USB drives, Local Area Networks, MSN, or even send itself via email messages if the system uses the Outlook Express.
The DDoS Trojan did do some good things to your computer as well. It helps you to remove any other Trojan that exists in your computer which you did not notice. This is to ensure that the user, which is you will not suspect any suspicious activity in your computer.
The master of the DDoS Trojan needs to communicate with its minions from time to time. The Trojan will privately sends message to the master from time to time. In order to keep the communication not suspicious, the DDoS Trojan will be smart enough to add itself into your firewall or antivirus authorized applications. This will kill off any pop up from your antivirus or firewall.
Conclusion of Java Update to DDoS Attack
The Backdoor.IRCBot.ADEQ Trojan that we had just mentioned is a very essential tool for hackers to take down sites through DDoS attack. If you do not want to be part of the DDoS attack, be sure you don’t update your software from any site except for the official site. Be sure as well that you had antivirus or firewall installed in the first place.
If you like the fake Java update on DDoS attack post, do subscribe to my blog by email.