Collaboration, transparency

Your Feed is from
CyberWisdom Safe Harbor Commentary on Hivenet Botnets:
A must-read story from describes a surprising fact that intelligent botnet clusters can identify and attack different attack vectors at once.
In the past few years, a new development has taken place: Predicting software systems are using artificial intelligence techniques for programming. Recent advances in these tools use clustering technology to leverage the expertise of massive databases, which are made up of billions of continuously updated data to make accurate predictions.
The bad news now is that this technology has not been overlooked by cybercriminals. A recent survey by Fortinet threat researchers showed that intelligent botnets have repeatedly attacked the Apache Struts framework vulnerabilities responsible for Equifax attacks. Attackers use automated and intelligent decision trees to exploit validated vulnerabilities.
Worse, botnets will evolve into honeynets in the future, a type of attack that can leverage peer-based self-learning to target vulnerable systems with minimal oversight. Hivenets is an intelligent cluster built around group technology that creates more effective attack vectors. Traditional botnets wait for orders from zombie herders and Honeywell can make its own decisions.
Hivenets will be able to use the infected device of the cluster to identify and attack different attack vectors at a time. As it identifies and compromises more devices, a Hivenet will multiply and expand its ability to attack multiple victims simultaneously.
Repeatedly Hivenet Botnets Infected
The researchers also found that many organizations experienced the same botnet infection many times, although it is not entirely clear why this occurred; this could be because the company did not fully understand the scope of the violation and botnets were dormant, Return to normal business operations once again, or the company never found the root cause. This allows botnets to return with the same vulnerability.
Safety best practice
Organizations that use cloud services for online transactions can reduce their exposure to cellular or botnets by following the following basic practices:
Inventory Authorization / Unauthorized device. This should include cataloging authorized and unauthorized assets in your environment, including consumer devices such as mobile phones and laptops. You must know what you are protecting.
Limit user rights: Not everyone needs administrator rights
Restrict Applications in Your Environment: Use only those applications that have business needs and keep these applications and systems up-to-date and fully patched. Using unnecessary applications can increase the attack surface and increase the complexity of protecting the environment.
Larger companies will also be good at following these recommendations. Good cyber hygiene: Beyond keeping a watch out for new threats and vulnerabilities in the wild, make sure you do not ignore what’s happening in your environment. Network hygiene and equipment hygiene may be the most overlooked factors in today’s security. Constantly removing unnecessary services, eliminating holes and maintaining good order is not the most interesting or sexiest part of security, but it is a very important part.
Read More…
These intelligent botnet clusters swarm compromised devices to identify and assault different attack vectors all at once. Engaging post, Read More…
thumbnail courtesy of

(adsbygoogle = window.adsbygoogle || []).push({
google_ad_client: “ca-pub-9083755448612431”,
enable_page_level_ads: true

If you like to receive more of these curated safe harbor news alerts then subscribe to my mailing list. and come back soon at to read further CyberWisdom Safe Harbor Commentaries. Home » Curated SafeHarboronCyber’s CyberWisdom Post
The post Rise of the Hivenet Botnets That Think for Themselves appeared first on Safe Harbor on Cyber.

Powered by WPeMatico

convert this post to pdf.
Be Sociable, Share!