The number of distributed denial of service (DDoS) attacks has increased 5 times in just one year.
The Ukrainian government and financial institutions have been fighting a wave of DDoS attack targeting their infrastructure coincides with the Russian regime’s gratuitous war raging against their country. Although denied by Russia, intelligence agencies in the UK and US still pin Cyber attack on the Russian state.
However, the usual motive for such an attack remains money. For example, network security The company Imperva recently repelled a DDoS attack on an undisclosed organization carrying a ransom note demanding one bitcoin (about $40,000 at the time) per day to stop the attack. and keep it that way.
According to cybersecurity researchers at Securelist, the number of DDoS attacks globally increased by a staggering 500% in just one year from the last quarter of 2020 to the last quarter of 2021.
“A big part of why DDoS is on the rise is that you don’t need to have technical knowledge to carry out such an attack.” Juta Gurinaviciute, Chief Technology Officer of NordLayer, a cybersecurity provider, said. “The cybercrime industry is booming and an interested party can hire such services for as little as hundreds of dollars. It’s a low-risk, high-reward game for criminals, and that’s why organizations need to be vigilant in protecting themselves against DDoS. ”
What exactly is a DDoS attack?
Distributed Denial of Service (DDoS) is a cyber attack that aims to cripple or bring down a target network or machine by over-encrypting it with redundant requests. In such an attack, the target is overloaded with requests coming from various sources, causing the system to become paralyzed in response to legitimate requests, or crash completely.
Typically, DDoS attacks are carried out through a botnet (short for bot network) – a globally dispersed and infected network of devices used to carry out attacks as a single unit. you are organized. A botnet may include compromised computers and other devices and be controlled remotely by a threat actor. Some botnets are also huge in size. For example, the infamous Meris botnet includes more than 250,000 infected devices and is growing.
“Cybercrime is exploding across the globe and DDoS attacks are one of the main threats facing organizations.” NordLayer CTO said. “At a time when more and more businesses and organizations are establishing their presence online, the barriers to entry to become a cybercriminal are dropping. Decision makers need to plan ahead to avoid the reputational and financial damage caused by DDoS attacks. Once an attack is underway, there is very little an unprepared organization can do to stop it.”
Protect organizations against DDoS
In most cases, DDoS attacks are delivered to the target infrastructure, applications, and data concurrently. This is done to widen the attack perimeter and increase the probability of success.
If a certain company doesn’t have an early DDoS threat detection system in place, they won’t know if an attack has occurred before their website slows down or goes down completely.
To combat these attacks, organizations must develop and implement a comprehensive strategy, including but not limited to steps such as:
Monitor network traffic
Knowing the difference between normal and abnormal traffic is the first line of defense against a DDoS attack. Unusually high traffic is one of the symptoms of an ongoing DDoS attack, and it’s important to tell the difference.
Have a DDoS response plan
Once the warning signs are there, you won’t have time to think about what to do next. That’s why having a thorough response plan is essential. A plan of this type should include a system checklist, a list of personnel, identification procedures, a crisis communication plan, and a list of all stakeholders that should be notified of the incident.
Network infrastructure security
A comprehensive threat management system is required to ensure an organizational network is well protected against a possible DDoS attack. Such a system would include an anti-ddos service, VPN, content filtering and antispam software, firewalls, load balancers, and possibly other solutions. Each of these services doesn’t have to be run separately – for most businesses, it’s best to use a cybersecurity provider that offers some or all of the services as a bundle.
Prioritize cloud-based solutions
Cloud-hosted applications are protected by vendors – this way malicious traffic is restricted before it reaches its intended destination, e.g. your business.
https://techround.co.uk/cybersecurity/ddos-attacks-as-a-tool-to-supplement-conventional-war-efforts/?utm_source=rss&utm_medium=rss&utm_campaign=ddos-attacks-as-a-tool-to-supplement-conventional-war-efforts DDoS attacks are complementing conventional warfare efforts