DDoS Attacks Made By Dark Frost Botnet Wreak Havoc On Gaming Industry

Tyler Cross Tyler Cross

Distributed denial-of-service attacks (DDoS) were launched across the entire gaming industry via the new Dark Frost botnet.

A DDoS attack is essentially when threat actors attempt to sabotage websites and services by creating massive amounts of traffic in an attempt to overwhelm their servers and crash them. This can also create vulnerabilities in the networks they target. This renders the services, websites, products, or online games completely unable to function during the attack.

Botnets take advantage of compromised devices around the world to perform various activities against the hosts will — oftentimes without their knowledge. They’re a form of malware that can come from a variety of sources and require a good antivirus to beat.

Botnets can be used to steal data en masse, mine cryptocurrency for the hacker, or in this case, be used to overwhelm their target servers by flooding them with intense amounts of traffic. The attack was a User Data Protocol flood (UDP flood), which sends tons of UDP data to a server before exploiting it during its attempt at processing it.

The researchers who discovered the new Dark Frost botnet, Akamai, point out that the threat actor responsible has been active since May 2022, while the botnet was flagged by their systems in February.

Dark Frost appears to be an amalgamation of several other botnets that came before it. Researchers found elements of various malware strains, including QBot, Mirai, and Gafgyt. They even posted their services as a DDoS for-hire group. The stolen code, DDoS attacks, and mercenary work are paired with one curious details.

The hacker was publishing live recordings of their attacks on various social media websites.

“The actor was observed boasting about their achievements on social media, utilizing the botnet for petty online disputes, and even leaving digital signatures on their binary file,” Akamai said.

About the Author

About the Author

Tyler is a writer at SafetyDetectives with a passion for researching all things tech and cybersecurity. Prior to joining the SafetyDetectives team, he worked with cybersecurity products hands-on for more than five years, including password managers, antiviruses, and VPNs and learned everything about their use cases and function. When he isn't working as a "SafetyDetective", he enjoys studying history, researching investment opportunities, writing novels, and playing Dungeons and Dragons with friends."