Tag Archive for: Demystifying

Demystifying Botnets: Understanding the Anatomy of a Cyber Threat | by Dwayne Wong (Omowale) | Jul, 2023


Botnets are networks of computers that are controlled by a central server. The computers in a botnet are called bots, and they can be infected with malware without the user’s knowledge. Once a bot is infected, it becomes part of the botnet and can be used for various malicious activities. The central server that controls the botnet is called the Command and Control (C&C) server. The C&C server sends instructions to the bots, which then carry out the commands.

Botnets are used for a variety of malicious purposes, including launching DDoS attacks, sending spam, spreading malware, and stealing sensitive information. DDoS attacks are one of the most common uses of botnets. In a DDoS attack, the bots in the botnet send a flood of traffic to a target server, which overwhelms the server and causes it to crash. This can result in significant downtime and financial losses for the victim.

Botnets work by infecting computers with malware, which then allows the central server to control the infected computers. The malware used to infect the computers can be delivered in various ways, including through email attachments, malicious websites, and software vulnerabilities. Once a computer is infected, it becomes a bot and can be controlled by the C&C server.

The C&C server sends instructions to the bots, which can include launching DDoS attacks, stealing sensitive information, or spreading malware. The bots receive their instructions through a command protocol, which can be encrypted to make it difficult to detect. The bots can also communicate with each other, which allows them to coordinate their attacks.

There are several types of botnets, each with its unique characteristics and methods of operation. Some of the most common types of botnets include:

IRC botnets are one of the oldest types of botnets and are still in use today. They use Internet Relay Chat (IRC) channels for communication between the bots and the C&C server. The bots connect to the IRC channel and wait for instructions from the C&C server.

Source…

Demystifying Cyber Security


Recent cyber attacks to the US Government, the IMO, Maersk, amongst others has caused the world to pay attention to criminal cyber activities by foreign states, terrorists, and criminals.  The cyber attack against CMA CGM shut down services for close on two weeks.  Two days later, on October 30th the IMO was held hostage by a cyber attack. These attacks follow attacks earlier this year against MSC and COSCO.

As of January 1, 2021 all vessels that have a safety management system must address cyber security in order to maintain ISM certification. The IMO guidelines for cyber security can be found in MSC-FAL.1/Circ.3. This high-level guidance is just the foundation for a proper cyber security program for owners/operators. The circular highlights the importance of protecting vulnerable systems such as:

  1. Bridge systems;
  2. Cargo handling and management systems;
  3. Propulsion and machinery management and power control systems;
  4. Access control systems;
  5. Passenger servicing and management systems;
  6. Passenger facing public networks;
  7. Administrative and crew welfare systems; and
  8. Communication systems.

The thought of having cyber security responsibilities can be chilling to some and burdensome to others. Personally, whenever I think of cyber security I think of some college kid in their parent’s basement trying to get the password to my bank account, which is incidentally empty. Or Even better, Matthew Broderick in War Games.  The truth is that hacking scenario, while it still exists is not the predominant cyber crime in the world today. Cyber crimes may be conducted by organized crime, nation states, terrorists, or industrial espionage. On the other side of the fence are the “white hat” hackers whose responsibility and job it is, is to find the weak links in a corporate cyber security chain. They expose weaknesses without exploiting them.

One does not need to be versed in code and hacking to be an efficient cyber security officer. Cyber security is as much about the protection of the system through the hardware as it is through the software. To demystify this field, I checked in with Cyber Security Specialist Cliff Neve, who retired from the USCG Cyber Security unit.  
The…

Source…

Demystifying Microsoft’s mobile operating system roadmap (Mary Jo Foley/ZDNet)

Mary Jo Foley / ZDNet:
Demystifying Microsoft’s mobile operating system roadmap  —  When Microsoft CEO Steve Ballmer recently criticized Google at the D8 conference for having two different mobile operating systems, it’s surprising so few challenged the pot for calling the kettle black.

Read more