Go-based HinataBot Discovered by Akamai

When Akamai benchmarked the botnet in 10-second HTTP and UDP attacks, the malware produced 20,430 requests with a combined size of 3.4 MB during the HTTP attack. There were 6,733 packets totaling 421 MB of data produced by the UDP deluge. The researchers calculated that the UDP flood might yield approximately 336 Gbps with 1,000 nodes and 3.3 Tbps with 10,000 nodes.

While defending against a targeted DDoS attack can be difficult, if organizations mutually limit the spread of the botnet on their networks they will achieve greater safety for themselves and the larger Internet community. One of the best defenses is a consistent and frequent patch cycle. A trademark of most botnets is their ability to spread through unpatched services, as well as SSH brute-forcing. Configuring SSH in a secure way is also crucial. Most importantly, creating firewall rules to only allow connections from specific IP addresses or ranges. Password based authentication should also be disabled in favor of SSH key pairs. Another best practice is to disallow SSH to the root user. Some may find it useful to change the default port of SSH to some higher port, which can help mitigate some attacks that come as a result of scanning common ports.

https://www.akamai.com/blog/security-research/hinatabot-uncovering-new-golang-ddos-botnet