New Dark Frost Botnet Targets GamingIndustry

new botnet Dark Frost
Written by William Reddy

Akamai experts have discovered a new Dark Frost botnet that specializes in DDoS attacks against gaming industry companies.

According to experts, the botnet was created based on the source codes of Gafgyt, QBot, Mirai and other similar malware stitched together, but has currently infected only hundreds of devices.

So, as of February 2023, the botnet included 414 machines with various architectures, including ARMv4, x86, MIPSEL, MIPS and ARM7. The malware is believed to have been active since at least May 2022.

Let me remind you that we also wrote that Cloud9 Botnet Attacks Chrome with Malicious Extensions, and also that Botnet KmsdBot Attacks Gaming Companies and Luxury Car Manufacturers.

The targets of the Dark Frost botnet operator include game companies, game server hosting providers, online streamers and other members of the gaming community with whom the attacker interacted and conflicted directly.

Akamai, who reverse-engineered the botnet, estimates its potential at around 629.28 Gbps through a UDP flood attack.

What makes this case interesting is that the attacker behind these attacks posted live recordings of his attacks for all to see. The operator has been seen boasting about his achievements on social media, using a botnet in small online disputes, and even leaving digital signatures in a binary file.experts say.

The attacker also created a Discord channel to facilitate ransomware attacks and stated that he intends to turn Dark Frost into a DDoS attack service for hire.

Experts say that Dark Frost is a prime example of how easy it is for novice cybercriminals with basic programming skills to jump into action using already available malware and cause significant business damage.

While not the most advanced or mind-blowing adversary, the Dark Frost botnet has managed to collect hundreds of compromised devices to carry out its tasks.Akamai said in the report.

About the author

William Reddy

I am from Ireland. My parents bought me a computer when I was 11, and several months after I have got a virus on this PC. I decided to enter the INSA Centre Val de Loire university after being graduated from the school. This French educational institution was offering a brand-new cybersecurity course. After getting the master's degree in cybersecurity, I've started working as a virus analyst in a little anti-malware vendor.

Leave a Comment