linkedin post 2019-06-04 04:21:59

Uncategorized
BOTNET SWARMS. “The Hide ‘N Seek IoT botnet, first detected this past spring, has moved the bar significantly closer to enabling a botnet to function as a swarm. It communicates in a complex and decentralized manner using custom-built peer-to-peer communication to implement a variety of malicious routines. It also leverages multiple anti-tampering techniques to prevent a third party from hijacking or poisoning it, and it is also the first IoT botnet malware strain that can survive device reboots and still remain on compromised devices.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-04 04:20:12

Uncategorized
MALWARE ADVANTAGE. “Not only will this emerging development accelerate the time required to breach a system, but the sheer volume that can be applied by a swarm-based botnet targeting multiple devices and exploits simultaneously can quickly overwhelm traditional defense systems.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-02 04:48:18

Uncategorized
EYE MIGRATION. "All adult flatfishes (Pleuronectiformes), including the gastronomically familiar plaice, sole, turbot and halibut, have highly asymmetrical skulls, with both eyes placed on one side of the head. This arrangement, one of the most extraordinary anatomical specializations among vertebrates, arises through migration of one eye during late larval development." https://lnkd.in/dXkc9jF View in LinkedIn
Read More

linkedin post 2019-06-04 04:18:48

Uncategorized
SWARM INTELLIGENCE. “Swarm-based insect colonies such as ants and bees use this process to manage the collection and distribution of resources and workloads. Likewise, artificial swarms can quickly share collected intelligence, accelerate trial and error, and then apply specific attacks to a vulnerability by leveraging those specialized members of the swarm armed with specific exploits.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-04 04:17:10

Uncategorized
SCALABLE SWARMS. “I have written several times about the next step in the evolution of botnets being a scalable architecture based on integrated and autonomous swarm intelligence. Swarm-based attacks can significantly decrease the time needed to breach a system by leveraging things like stigmergy, which is a consensus-based social network mechanism of indirect coordination between agents.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-04 04:15:13

Uncategorized
SWARM AND BLOCKCHAIN MALWARE. “The accelerated development of several precursors of Swarmbots and Hivenets are especially worth revisiting. Others include the increased targeting of critical infrastructure, the development of automation in malware exploits, and the use of blockchain technology to anonymize the command and control of botnets.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More