2 min read

DDoS attacks rise 180% in 2015, Akamai says

Alexandra GHEORGHE

December 23, 2015

DDoS attacks rise 180% in 2015, Akamai says

This year, the frequency of DDoS attacks has nearly tripled, according to security firm Akamai.

2015 saw some 1500 DDoS attacks – an 180 percent increase from last year. However, the average attack is shorter in length and lower in volume than in the past. The average DDoS attack lasted 18.86 hours, down from 22.36 hours in 2014.

There are several variables as it relates to the customer posture with regard to always on versus on demand which allows for mitigation to be applied faster and in some instances more proactively, the other variable is that the actors seem to be doing more probing of the customer environment which means shorter attack duration to potentially identify vulnerabilities,” Lisa Beegle, information security manager for Akamai, told SCMagazine.com in an email.

The US and China are the sources of most attacks.

Recently, Anonymous claimed responsibility for a massive 40Gbps DDoS attack on Turkish DNS Servers hosted under NIC.tr. The reason behind the attack seems to be that Turkey allegedly supports ISIS, the terrorist group.

anonymous-claims-responsibility-of-40-gbps-ddos-attack-on-turkish-servers

Source: hackread.com

Other major DDoS attacks of 2015 include: Hacked.com and sister site CryptoCoinsNews.com, GitHub, Sony PlayStation and Xbox Live’s network.

Online gaming is the most targeted industry, with a 50 percent increase during the third quarter of the year. Incidents related to high-profile game releases, such as Call of Duty Black Ops, made online gaming the most targeted industry for more than a year, according to the report.

Who is behind DDoS attacks?

By nature, DDoS attacks are anonymous. Most of them use IP address spoofing to make the source of attacks almost impossible to identify.

Anyone can launch an attack within seconds: organized cyber-crime groups, state-sponsored hacking groups, a disgruntled student looking for revenge, a former employee searching for blackmail motives or a hacker trying to prank the educational system.

What’s more, an attack can be deployed by relatively unsophisticated attackers who pay for easily available, low-cost DDoS-for-hire services. Pre-packaged DDoS toolkits are also available for anyone with minimal know-how to use.

Sometimes, hackers use DDoS attacks as decoys to occupy security staff while they attack networks and steal data. While IT staff is tied up with the disruption, attackers can plant malware and prepare other types of attacks with more severe security implications.

How to prepare for a DDoS attack

Anyone can become a victim.

Unfortunately, DDoS attacks are extremely complex. Multiple layers of filtering are required to secure networks and web applications. Key preventative measures include using a cloud-based anti-DoS/ DDoS service that routes suspicious traffic to a centralized location and filters out malicious traffic. It absorbs a high volume of malicious traffic across a distributed network of servers to shield a company’s website and applications.

Good web-application hygiene (updates and patches) is also essential for defending against denial of service disruptions in 2016.

tags


Author



Right now

Top posts

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

July 29, 2021

5 min read
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Supply Chain Attack Detected in PyPI Library Supply Chain Attack Detected in PyPI Library
Silviu STAHIE

August 02, 2021

1 min read
Scam baiter Jim Browning bamboozled by scammers into deleting his own YouTube channel Scam baiter Jim Browning bamboozled by scammers into deleting his own YouTube channel
Filip TRUȚĂ

August 02, 2021

3 min read
Instagram influencer Hushpuppi admits his part in scams that stole more than $24 million Instagram influencer Hushpuppi admits his part in scams that stole more than $24 million
Graham CLULEY

July 30, 2021

2 min read