The outage follows IoT-based DDoS attacks that knocked out internet access to many US sites Following Friday’s massive internet disruption in the U.S., a Singapore-based broadband provider reports it faced two distributed denial-of-service attacks, forcing users offline.The attacks, which occurred Saturday and then on Monday, targeted Singapore’s StarHub, briefly cutting internet access for the company’s home broadband subscribers before services were restored.“These two recent attacks that we experienced were unprecedented in scale, nature and complexity,” StarHub said in a Facebook posting on Wednesday.In addition, the company has reportedly said that malware-infected broadband routers and webcams were involved in the two attacks, producing a spike in internet traffic that overwhelmed the company’s services. That behavior matches that of malware known as Mirai — a malicious code that can infect internet-connected devices like cameras and DVRs, and has been partly blamed for Friday’s DDoS attack in the U.S.StarHub has reportedly said it’s investigating whether the Singapore incident is related to Friday’s disruption in the U.S, but that it’s too early to draw any conclusion. It also said that the infected devices were bought by the company’s very own subscribers. Over the next few days, StarHub will send agents to affected customers to “clean up” the devices, said its chief technology officer Mock Pak Lum in taped comments. It’s unclear why someone would target StarHub. The company only has 473,000 household subscribers of its broadband services. But security experts are concerned that more massive DDoS attacks could occur. The unknown developer behind the Mirai malware released its source code to the hacker community On September 30, meaning anyone with modest means can use it. Since then, companies have noticed copycat hackers already exploiting the malware to infect half a million devices. Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe