Hacker uses Fake Java Update for DDoS Attack

Have you ever thought of how hackers launched a DDoS attack? Do they buy a lot of computers or they are actually making use of your computer as their army for the attack? Before we move into this topic any further, I would like to take this opportunity to give a short introduction on DDoS.

ddosDDoS, also known as Distributed Denial-of-Service attack is a method of unethical hacking where it will floods the target with a large amount of traffic until it is completely compromised. I really mean a large amount of traffic and this amount of traffic is not easily done with just a single computer. Hence hackers will use a lot of computers as their source of army to launch the attack. The question now is, how the hacker gain that kind of resources to start a DDoS attack? A recruitment drive?

Fake Java Update is the Recruitment Drive for DDoS Attack

Unfortunately, it is not only the Java update is used for a DDoS recruitment drive. If you read about recent news, the fake Adobe Flash player update is also used for this sort of thing. This sort of recruitment drive is a unwilling recruitment, or javaalso known as a silent recruitment. You will not even notice that you are infected simply because a Trojan is not as harmful as a Virus because the purpose is not to harm your computer, but to make use of you as a weapon for their destruction or money making purposes.

The Backdoor.IRCBot.ADEQ is the fake Java udpate Trojan. It is extremely “contagious”, as it can be downloaded from a multitude of locations, most of them being legit websites that have been infected by the tool. The key strength of this Trojan is that it has a dedicated infection for each computer. On top of that, it can spread via P2P shared folder, USB drives, Local Area Networks, MSN, or even send itself via email messages if the system uses the Outlook Express.

The DDoS Trojan did do some good things to your computer as well. It helps you to remove any other Trojan that exists in your computer which you did not notice. This is to ensure that the user, which is you will not suspect any suspicious activity in your computer.

The master of the DDoS Trojan needs to communicate with its minions from time to time. The Trojan will privately sends message to the master from time to time. In order to keep the communication not suspicious, the DDoS Trojan will be smart enough to add itself into your firewall or antivirus authorized applications. This will kill off any pop up from your antivirus or firewall.

Conclusion of Java Update to DDoS Attack

The Backdoor.IRCBot.ADEQ Trojan that we had just mentioned is a very essential tool for hackers to take down sites through DDoS attack. If you do not want to be part of the DDoS attack, be sure you don’t update your software from any site except for the official site. Be sure as well that you had antivirus or firewall installed in the first place.

If you like the fake Java update on DDoS attack post, do subscribe to my blog by email.

Build Your Own Security
Subscribe to my newsletter and get a copy of my eBook for free.
We hate spam just as much as you

Related posts:

  1. Phishing Attack Hits Twitter's Users via Direct Messages
  2. Beware: Phishing Attack Hits Paypal
  3. Blog Update – Author Information
About Alan Tay

This blog is owned and operated by myMediaInc. My Media operates content based online portals for IT professionals, technology managers and decision makers as well as business leaders. We publish original quality content focused in Software Development, IT Security, SaaS, Cloud Computing, Outsourcing, Project Management and Mobile and Wireless. Our mission is to explore how to help you optimize your resources in each of these areas.

Find us here IT Security Column.


  1. Gaz says:

    I think antivirus tools have come a long way

    • Alan Tay says:

      Indeed you are true about that. However, detecting a Trojan is not easy as well. Nowadays all the malicious code can hide themselves until the commit some crime only antivirus can detect.

Speak Your Mind


CommentLuv badge

This blog uses premium CommentLuv which allows you to put your keywords with your name if you have had 3 approved comments. Use your real name and then @ your keywords (maximum of 3)