Friend
Professional
- Messages
- 2,653
- Reaction score
- 850
- Points
- 113
How the release of a new game attracted the attention of hackers.
On August 24, there was a sudden glitch on the Steam platform, which caused massive complaints from players around the world about the inability to log in to their accounts. Initially, many users suggested that the cause of the incident was the influx of players to the popular game Black Myth: Wukong. However, as it turned out later, the real reason was a large-scale DDoS attack on Steam servers.
According to Perfect World, the attack affected both Steam's international servers and the company's servers in China. In total, 107 server IP addresses in 13 countries, including the United States, China, Japan, Germany, and others, were affected. The attack was well planned and carried out in four waves, each of which targeted spikes in player activity in different time zones to cause maximum disruption to the platform.
XLab's cyber threat analysis research team found that more than 60 botnet control nodes were involved in the attack, coordinating the actions of thousands of infected devices. According to XLab, the main source of the attack was a botnet called AISURU, which, according to its operators, numbered around 30 thousand bots and had an attack power of up to 2 terabits per second.
The incident coincided with the release of the game Black Myth: Wukong on the Steam platform, which raises suspicions that the attack may have been aimed at undermining the Chinese gaming market. Prior to this incident, no serious attacks on Perfect World servers were recorded.
AISURU has become known in the cybercriminal community for its powerful attacks. This botnet, which evolved from the previously discovered Fodcha, exploited numerous vulnerabilities to hijack devices and orchestrate attacks. AISURU continued to apply the strategies of its predecessor, but at the same time introduced its own innovations in the field of encryption and network communications.
For the attack, AISURU used a complex bot control system and encrypted commands to coordinate its actions. During the analysis, it was found that the botnet used various protocols to bypass protective systems and was able to adapt to new threats.
This event showed that DDoS attacks remain a serious threat to large Internet services, despite their age. Playing a key role in disrupting the platform, the AISURU attack was one of the largest in recent memory, affecting the global gaming industry and causing significant disruptions.
Source
On August 24, there was a sudden glitch on the Steam platform, which caused massive complaints from players around the world about the inability to log in to their accounts. Initially, many users suggested that the cause of the incident was the influx of players to the popular game Black Myth: Wukong. However, as it turned out later, the real reason was a large-scale DDoS attack on Steam servers.
According to Perfect World, the attack affected both Steam's international servers and the company's servers in China. In total, 107 server IP addresses in 13 countries, including the United States, China, Japan, Germany, and others, were affected. The attack was well planned and carried out in four waves, each of which targeted spikes in player activity in different time zones to cause maximum disruption to the platform.
XLab's cyber threat analysis research team found that more than 60 botnet control nodes were involved in the attack, coordinating the actions of thousands of infected devices. According to XLab, the main source of the attack was a botnet called AISURU, which, according to its operators, numbered around 30 thousand bots and had an attack power of up to 2 terabits per second.
The incident coincided with the release of the game Black Myth: Wukong on the Steam platform, which raises suspicions that the attack may have been aimed at undermining the Chinese gaming market. Prior to this incident, no serious attacks on Perfect World servers were recorded.
AISURU has become known in the cybercriminal community for its powerful attacks. This botnet, which evolved from the previously discovered Fodcha, exploited numerous vulnerabilities to hijack devices and orchestrate attacks. AISURU continued to apply the strategies of its predecessor, but at the same time introduced its own innovations in the field of encryption and network communications.
For the attack, AISURU used a complex bot control system and encrypted commands to coordinate its actions. During the analysis, it was found that the botnet used various protocols to bypass protective systems and was able to adapt to new threats.
This event showed that DDoS attacks remain a serious threat to large Internet services, despite their age. Playing a key role in disrupting the platform, the AISURU attack was one of the largest in recent memory, affecting the global gaming industry and causing significant disruptions.
Source