A new Distributed Denial-of-Service (DDoS) tool called Cliver has been announced by a threat actor, promising powerful capabilities and a variety of methods for disrupting web services. Cliver boasts several attack methods, including strong HTTP/2 header attacks (http2), TLS floods with bypass (tls), high-rate HTTP/2 flooders with bypass (http-rose), Cloudflare bypass HTTP DDoS (http-ddos), low-rate HTTP/2 flooders for protected sites (http-zeus), high-request HTTP/1.1 floods for HTTP sites (http-blue), and high-request flooders with bypass and headers (http-star). Additionally, it features browser emulation for bypassing CAPTCHA (browser) and browser emulation with proxies and headers (browserv2).
The threat actor provided further details in a frequently asked questions section. Cliver is described as a powerful Layer 7 (L7) DDoS panel with numerous private methods, capable of being set up on both Linux and Windows operating systems. It is capable of sending up to 500,000 requests per second using only one device. Cliver also automatically scrapes and uses HTTP proxies.
The tool is being sold for $20, with payment accepted in various cryptocurrencies, excluding Bitcoin (BTC) and Tether (USDT). This announcement highlights the continued evolution of DDoS tools, making it easier for malicious actors to launch sophisticated attacks. The affordability and advanced features of Cliver underscore the importance of robust cybersecurity measures for all web services.