A configurable, malicious Traffic Direction System (TDS) has been enabling widespread malware attacks. The “Prometheus” TDS can direct malware at a variety of potential victims, boosting the potential size and impact of attacks. Several high-profile trojan operators have reportedly used Prometheus to conduct malware attacks on a large scale. As a relatively cheap cybercriminal service―one that is readily available on a cybercriminal forum―Prometheus is also likely enabling many other threat actors, including those without technical sophistication. Considering the similar offerings available online, there seems to be a growing market for platforms that help malware operators expand the impact of their attacks. This TDS is just one example of the growing professionalization of cybercriminal services.
The well-established “Mozi” peer-to-peer (P2P) botnet has developed new persistence capabilities.
Most Recent Flipbooks
Main story: ProxyNotShell spells déjà vu for MS Exchange Server defenders
Main story: Rogue ex-developer leaks LockBit 3.0 builder
Main story: Uber compromised by Lapsus$'s resurgence
Main story: Cyber attacks shock the Italian energy sector
Main story: Back to school for students and ransomware groups
Main story: LastPass suffers source code data breach
Main story: LockBit under DDoS attack: Entrust strikes back?
Main Story: Cisco defies extortion attempts after network breach
Main story: Cybercriminals scramble for new hiding places after 911 proxy service folds
Main story: Free-to-use Redeemer opens doors for ransomware enthusiasts
Main story: LockBit launches new version, welcomes bug hunters
Main story: Attackers seize Microsoft zero-day for malware dissemination, espionage