Researchers have discovered a new DDoS botnet capable of launching attacks with data volumes reaching several Tbps.
Akamai said the malware itself was christened “Hinata” by its author after a character from the Naruto anime series. The security vendor found evidence of the “HinataBot” in its HTTP and SSH honeypots and said it is being actively updated by its authors.
While previous versions launched DDoS flooding attacks over multiple protocols, the newest HinataBot iteration uses just HTTP and UDP flooding techniques
Malware is spread by hacking SSH endpoints or via malicious scripts and RCE payloads for known weaknesses.
Once the malware has infiltrated a device, it will lie dormant until it receives instructions from the command and control server.
Akamai’s security experts they created a C2 of their own and interacted with artificial infections to set up HinataBot for DDoS attacks, allowing them to observe the malware in action and deduce its attack capabilities.
The size of HTTP packets usually varies and ranges from 484 to 589 bytes. In contrast, the UDP packets produced by HinataBot are incredibly large – up to 65.549 bytes! These data-filled packets consist of zero bytes that can quickly overwhelm the target with a powerful flood of traffic.
“If the botnet contained just 1000 nodes, the resulting UDP flood would weigh in at around 336 Gbps per second. With 10,000 nodes (roughly 6.9% of the size of Mirai at its peak), the UDP flood would weigh in at more than 3.3 Tbps. The HTTP flood at 1000 nodes would generate roughly 2.7 Gbps and more than 2 Mrps. With 10,000 nodes, those numbers jump to 27 Gbps delivering 20.4 Mrps.”
Leave A Comment