Yandex suffered the largest DDoS attack in history
Yandex is also known as "Russian Google" and at the peak they suffered an attack with a scale of up to 21.8 million access requests per second.
The new botnet is named Meris and it consists of tens of thousands of devices controlled by hackers. The researchers believe that most devices in the Meris botnet are high profile network accessories.
The Russian press described Meris' attack on Yandex as the largest in the history of the Russian internet (aka RuNet). Details of the attack have just been shared by Yandex and their anti-DDoS partner, Qrator Labs.
According to information gathered from several single attacks, the force of the Meris botnet amounted to more than 30,000 devices. Meris (Mēris) is a Latvian word meaning calamity.
From the data that Yandex tracks, the attack on their server was conducted based on about 56,000 clues. However, researchers have discovered indications that the number of devices that the people behind Merit are controlling may be closer to 250,000.
The difference between the number of devices used to attack and the number of devices being controlled showed that Meris had not yet used its full power. Besides, the Meris botnet is not made up of weak IoT devices but powerful network devices with Ethernet connectivity.
However, that record was broken by Meris herself when she attacked Yandex on September 5 with a traffic of 21.8 million RPS. Yandex has suffered several attacks in the past month with increasing intensity:
- August 07: 5.2 million RPS
- August 9th: 6.5 million RPS
- August 29: 9.6 million RPS
- August 31: 10.9 million RPS
- September 5th: 21.8 million RPS
According to the researchers, to deploy an attack, Meris relies on a SOCKS4 proxy on hacked devices, using DDoS techniques over HTTP connections and port 5678. Meanwhile, the devices that Meris controls are all devices. is related to MikroTik, a Latvian manufacturer of networking equipment with mainly corporate clients.
Most devices controlled by Meris have ports 2000 and 5678 open. In which, MikroTik uses public 5678 for the MikroTik Neighbor Discovery Protocol (MikroTik Neighbor Discovery Protocol).
When searching the public internet, researchers discovered 328,000 servers with open TCP port 5678. However, not all of these were MikroTik devices. Currently MikroTik has been informed about this issue.
You should read it
- What is Volumetric DDoS Attack?
- What is DDoS Extortion attack?
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- 5 Things You Didn't Know About DDoS attacks
- How to prevent DDoS attack with Nginx
- What is botnet DDoS?
- One of the biggest HTTPS DDoS attacks ever seen was stopped
- DDoS Attack Group Extortion sent requests to extort money to thousands of companies
- Prepare the total force to respond to DDoS attacks in 2014
- How many DDoS cases are reported in 2019?
- Cloudflare provides tools to reduce the effects of free DDoS attacks
- What is DDoS ICMP Flood?
Maybe you are interested
BadBox Malware Is Picking Up Speed, Targeting Certain Android Devices
Android's new Find Nearby feature helps detect unwanted Bluetooth tracking devices
Why many people choose to use wireless technology, away from wired devices
Disable Wi-Fi on These 7 Devices to Boost Privacy
iPhone XS Max and 6s Plus officially become 'classic' devices
7 Types of Devices That Need a Factory Reset Before Selling