Own a website? Then your worst nightmare just became real

Cyberattacks ahead

DDoS has become an increasingly prevalent menace throughout the course of this year, and the release of the source code for the 'Mirai' botnet is going to seriously hike threat levels.

If you've been following security news recently, you'll likely have noticed that new records for DDoS attacks have been swiftly set – first with an assault on the Krebs on Security website which reached 620Gbps, but that quickly fell after two simultaneous barrages of 799Gbps and 191Gbps were recorded hitting French hosting company OVH.com.

That's some eye-watering firepower and these attacks are fuelled by giant botnets of compromised Internet of Things devices, and the likes of routers, DVRs and security cameras which are easily hacked as they've been left with factory default passwords.

So, the bad news is that Mirai is one such botnet (alongside the more prevalent 'Bashlight'), and the release of its source code – which security researcher Brian Krebs himself spotted – puts the tools to craft these sort of massive attacks into less-skilled cybercriminal hands.

Circle of compromise

And the more widespread usage that Mirai sees, the more poorly defended IoT and similar devices will be compromised, and thus an increasingly large amount of potential DDoS firepower will be out there.

Meaning that websites and businesses could be taken down and assaulted with ever more powerful DDoS in combination with ransom demands – in other words, pay up or the carnage won't stop.

As Dale Drew, CSO at Level 3 Communications, told Ars Technica: "These botnets are largely being used in [DDoS-for ransom] campaigns … By releasing this source code, this will undoubtedly enable a surge in botnet operators to use this code to start a new surge in consumer and small business IoT compromises."

He further warned: "I predict that botnet operators … will be searching for a larger inventory of IoT exploits to take advantage of. This could be the start of a surge of attacks against IoT devices in the consumer space."

So now might be a good time to check that your router, security camera or other internet-connected gadget has a proper username and password set, rather than being left on the default settings.

Krebs spotted the post from the hacker releasing the source code, which observed that the scope for attacks had recently dropped. The hacker noted: "With Mirai, I usually pull max 380k bots from telnet alone. However, after the Kreb [sic] DDoS, ISPs been slowly shutting down and cleaning up their act. Today, max pull is about 300k bots, and dropping."

However, with the release of the source, as mentioned we can certainly be sure that overall levels of IoT-powered DDoS will be doing anything but dwindling.

Following the OVH.com attack, Octave Klaba, founder and CTO of the firm, said that he believed the botnet responsible could easily be upped to fire out a DDoS volley in excess of 1.5Tbps. Doubtless, it won't be long before we see the next distributed denial of service record being set.

Darren is a freelancer writing news and features for TechRadar (and occasionally T3) across a broad range of computing topics including CPUs, GPUs, various other hardware, VPNs, antivirus and more. He has written about tech for the best part of three decades, and writes books in his spare time (his debut novel - 'I Know What You Did Last Supper' - was published by Hachette UK in 2013).

Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring