{"id":2278,"date":"2015-10-27T20:15:45","date_gmt":"2015-10-27T20:15:45","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2278"},"modified":"2020-05-06T10:30:08","modified_gmt":"2020-05-06T17:30:08","slug":"ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/","title":{"rendered":"DDoS for Bitcoin, Linux Botnets and Connected Cameras \u2013 The Saga Continues"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-975\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/IPv6-COE-Blog.jpg\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-COE-Blog.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-COE-Blog-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>Distributed Denial of Service (DDoS) attacks are evolving every year. From brute force bandwidth clogging 300 Gbps attacks on a media firm that we saw last year to NTP, DNS (Domain Name System) and SSDP (Simple Service Discovery Protocol) attacks that peaked in the first half of this year, unsuspecting organizations are constantly subjected to DDoS, that slows their systems down and affects their business.<\/p>\n<p>In a recent Infoblox\u00a0<a href=\"\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/\" target=\"_blank\" rel=\"noopener noreferrer\">post<\/a>, you saw that an open resolver can be a dangerous thing and can be used in DNS reflection attacks. But cybercriminals are finding more creative ways to find vulnerabilities and launch attacks. Let me take you through a few examples.<\/p>\n<p>Most recently, a Linux botnet launched powerful DDoS attacks against organizations in the online gaming and education industries in Asia and US. The main attack vectors were SYN and DNS floods and the bandwidth of the attacks reached up to 150+ Gbps, according to Akamai\u2019s\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.stateoftheinternet.com\/downloads\/pdfs\/2015-threat-advisory-xor-ddos-attacks-linux-botnet-malware-removal-ddos-mitigation-yara-snort.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">threat advisory<\/a>\u00a0on the attacks. Botnet based DDoS attacks have been in use often in the past but what makes this attack unique is that it involves infected Linux machines running a stealthy Trojan called \u201cXOR DDoS\u201d. Although this infection happened by cracking weak passwords and was not the result of the exploitation of vulnerability in the Linux OS itself, the botnet grew quickly to launch large scale DDoS attacks. This goes to show that proper maintenance and governance of systems, including Linux machines, which are generally considered secure, is key.<\/p>\n<p>The second general trend we see more of today is insecure consumer devices like web-connected cameras forming a botnet and launching DDoS attacks. As the race to \u201cconnect things\u201d reaches a feverish pace, security considerations are taking a back seat and hackers are exploiting these vulnerable embedded devices. Among these \u201cIoT botnets\u201d, CCTVs are one of the most frequently used connected devices to launch DDoS attacks. In addition, there have been cases of DNS DDoS malware infiltrating consumer devices like home gateways and Internet connected cameras.<\/p>\n<p>Saving the best for last, let\u2019s look at the biggest DDoS story of the year \u2013 DDoS for Bitcoin. If you haven\u2019t already heard, DDoS for Bitcoin or DD4BC as it has been called, is the name given to an attack campaign launched by an extortionist group. The campaign, primarily targeted at financial services industries, but most recently expanded to target media, entertainment, online gaming and retail companies in Europe, Australia and US, starts with low scale DDoS attacks like UDP floods launched at the target to \u201cdemonstrate\u201d the cybercriminal\u2019s capability. Then, the target is asked to pay a Bitcoin ransom to avoid being bombarded with a much larger DDoS attack that could take its website down. There are least three dozen known targets that have been victims of DDoS for Bitcoin. Some have paid up to buy time and put mitigation in place while others have refused.<\/p>\n<p>DDoS attacks of any kind are always disruptive. Having a well thought out DDoS response process and implementing the right mitigation technologies is essential to minimizing the effects of an attack on the business. Infoblox provides a crucial component in your DDoS mitigation arsenal \u2013Infoblox External DNS Security, a DNS server with built-in DDoS protection that provides defense against the widest range of DNS based DDoS attacks. It intelligently detects and mitigates DNS DDoS from the Internet while responding only to legitimate queries. Moreover, it uses Infoblox Threat Adapt technology to automatically update its defense against new and evolving threats as they emerge, without the need for patching.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2284\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/ddos.png\" alt=\"\" width=\"900\" height=\"960\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ddos.png 900w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ddos-281x300.png 281w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ddos-768x819.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p>DNS is the top application layer attack vector tied with HTTP. DNS is also the number one protocol used for reflection\/amplification attacks.<\/p>\n<p>So while you may not be able to do much about those improperly secured coffee machines and refrigerators connecting to the Internet, you can do something about preventing your critical networking infrastructure like DNS from going down in the event of a DDoS attack.<\/p>\n<p>Read this\u00a0<a href=\"https:\/\/www.infoblox.com\/resources\/ebook\/top-ten-dns-attacks?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">eBook<\/a>\u00a0to learn more about the top ten DNS attacks.<\/p>\n<p>To learn more about how Infoblox External DNS Security can help mitigate DNS DDOS, read this\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/sites\/infobloxcom\/files\/resources\/infoblox-datasheet-external-dns-security_0.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">datasheet<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Distributed Denial of Service (DDoS) attacks are evolving every year. From brute force bandwidth clogging 300 Gbps attacks on a media firm that we saw last year to NTP, DNS (Domain Name System) and SSDP (Simple Service Discovery Protocol) attacks that peaked in the first half of this year, unsuspecting organizations are constantly subjected to [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":975,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[30,15],"class_list":{"0":"post-2278","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-dns","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DDoS for Bitcoin Linux Botnets and Connected Cameras \u00e4\u00f3\u0144 The Saga Continues<\/title>\n<meta name=\"description\" content=\"Distributed Denial of Service (DDoS) attacks are evolving every year.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS for Bitcoin, Linux Botnets and Connected Cameras \u2013 The Saga Continues\" \/>\n<meta property=\"og:description\" content=\"Distributed Denial of Service (DDoS) attacks are evolving every year.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-27T20:15:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-COE-Blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"DDoS for Bitcoin, Linux Botnets and Connected Cameras \u2013 The Saga Continues\",\"datePublished\":\"2015-10-27T20:15:45+00:00\",\"dateModified\":\"2020-05-06T17:30:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/\"},\"wordCount\":697,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-COE-Blog.jpg\",\"keywords\":[\"DNS\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/\",\"name\":\"DDoS for Bitcoin Linux Botnets and Connected Cameras \u00e4\u00f3\u0144 The Saga Continues\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-COE-Blog.jpg\",\"datePublished\":\"2015-10-27T20:15:45+00:00\",\"dateModified\":\"2020-05-06T17:30:08+00:00\",\"description\":\"Distributed Denial of Service (DDoS) attacks are evolving every year.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-COE-Blog.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-COE-Blog.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DDoS for Bitcoin, Linux Botnets and Connected Cameras \u2013 The Saga Continues\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DDoS for Bitcoin Linux Botnets and Connected Cameras \u00e4\u00f3\u0144 The Saga Continues","description":"Distributed Denial of Service (DDoS) attacks are evolving every year.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/","og_locale":"en_US","og_type":"article","og_title":"DDoS for Bitcoin, Linux Botnets and Connected Cameras \u2013 The Saga Continues","og_description":"Distributed Denial of Service (DDoS) attacks are evolving every year.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/","og_site_name":"Infoblox Blog","article_published_time":"2015-10-27T20:15:45+00:00","article_modified_time":"2020-05-06T17:30:08+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-COE-Blog.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"DDoS for Bitcoin, Linux Botnets and Connected Cameras \u2013 The Saga Continues","datePublished":"2015-10-27T20:15:45+00:00","dateModified":"2020-05-06T17:30:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/"},"wordCount":697,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-COE-Blog.jpg","keywords":["DNS","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/","url":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/","name":"DDoS for Bitcoin Linux Botnets and Connected Cameras \u00e4\u00f3\u0144 The Saga Continues","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-COE-Blog.jpg","datePublished":"2015-10-27T20:15:45+00:00","dateModified":"2020-05-06T17:30:08+00:00","description":"Distributed Denial of Service (DDoS) attacks are evolving every year.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-COE-Blog.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-COE-Blog.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/ddos-for-bitcoin-linux-botnets-and-connected-cameras-the-saga-continues\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"DDoS for Bitcoin, Linux Botnets and Connected Cameras \u2013 The Saga Continues"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2278"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2278\/revisions"}],"predecessor-version":[{"id":3752,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2278\/revisions\/3752"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/975"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}