The malware known as Mirai had already been blamed for causing at least part of Friday's distributed denial - of - service attack, which
targeted Dyn and slowed access to many popular sites in the U.S.
Hackers pummeled the code - sharing site's servers with 1.35 terabytes per second of bogus Internet traffic — 15 % stronger than the next biggest DDoS attack, which
targeted Dyn, an Internet infrastructure company (now owned by Oracle), in late 2016.
Unidentified attackers assembled those infected devices into a botnet to
target Dyn, a DNS service provider, on Friday, as well as security blogger Brian Krebs.
Not exact matches
Botnets created from the Mirai malware were at least partly responsible for Friday's massive internet disruption, according to
Dyn, the DNS service provider
targeted in the assault.
Dynamic domain name service provider
Dyn was one of the
targets of the Mirai botnet DDoS attacks in October last year, preventing a significant number of users from accessing websites and online services.