'Reaper' IoT Botnet Likely a DDoS-for-Hire Tool
Latest IoT botnet commandeers 10,000 to 20,000 devices with an additional 2 million hosts identified.
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
The IoT botnet IoTroop has amassed 10,000 to 20,000 devices and has another 2 million hosts that have been identified as potential botnet nodes, according to Arbor's Security Engineering & Response Team (ASERT), which refers to the botnet as Reaper.
Although it's not clear why the 2 million hosts have not yet been absorbed into the Reaper botnet, Arbor Network's ASERT speculates that the botnet will likely be used as a booter/stresser service for China's internal DDoS-for-hire market.
Reaper contains a hint of code from the infamous IoT botnet Mirai and has the ability to launch SYN, ACK, and http floods, as well as DNS reflection/amplification attacks, according to the researchers.
Read more about Reaper here.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024