Akamai discovers Dark Frost botnet exploiting gaming platforms

Share post:

Akamai’s security intelligence response team recently has alerted the general public of Dark Frost, a botnet that has corrupted over 400 machines.

This botnet primarily targets the gaming sector, including game developers, game server providers, and internet broadcasters. The revelation throws light on the actions of a person in their early twenties living in the United States who claims to have a few years of development expertise. Dark Frost’s creator aims to commercialize the botnet by providing it as a DDoS-for-hire and spamming tool, aggressively marketing these illicit activities, and even publishing images of supposed bank transactions as proof.

Dark Frost is inspired by a number of well-known malware strains, including Gafgyt, QBot, and Mirai. It is made up of hacked devices that run on various architectures like as ARMv4, x86, MIPSEL, MIPS, and ARM7. The botnet is built by stealing code from well-known malware families, giving the attacker the capacity to successfully execute assaults against the gaming sector.

Using UDP flood assaults, Dark Frost can inundate a server with a massive amount of traffic, reaching an astounding pace of 629.28 Gbps. The server is inundated with a tremendous stream of User Datagram Protocol (UDP) packets in these assaults.

Allen West, an Akamai security researcher, mentioned these findings.

The sources for this piece include an article in TechRepublic.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways