Bonus $100
Promo Codes 2024
USA Elections 2024
Users' Choice
90
89
88
85

DDoS-for-hire market drives attack innovation

05 Feb 2015
00:00
Read More

An “incredible number” of DDoS attacks occurred in the fourth quarter of 2014, almost double the number observed by Akamai Technologies in Q4 of 2013.

The vendor's Q4 2014 State of the Internet – Security Report shos that there was also a 52% increase in average peak bandwidth of DDoS attacks compared to Q4 a year ago.

"Denial of service is a common and active threat to a wide range of enterprises. The DDoS attack traffic was not limited to a single industry, such as online entertainment that made headlines in December. Instead, attacks were spread among a wide variety of industries," said John Summers, vice president, Cloud Security Business Unit, Akamai.

Large packets of unwanted network traffic can quickly sap an enterprise's ability to respond to legitimate customers, resulting in denial of service outages. Most unprotected sites cannot withstand a typical DDoS attack. As a result, DDoS attacks have become part of the common cybersecurity threatscape that all enterprises with an online presence must anticipate in a risk assessment.

Resourceful DDoS-for-hire booter suites took a low-investment approach by tapping into reflection-based DDoS attacks.

Nearly 40% of all DDoS attacks used reflection techniques, which rely on Internet protocols that respond with more traffic than they receive and do not require an attacker to gain control over the server or device.

Widespread availability of for-hire DDoS services allowed low-level, non-technical attackers to purchase ready-to-use DDoS services. The expansion of the DDoS-for-hire market also promoted the use of multi-vector campaigns, as the competitive market drove attack innovation. Significantly more multi-vector attacks were observed – 88% more than in Q4 2013. More than 44% of all attacks used multiple attack vectors.

The timing of DDoS attacks was distributed more evenly in Q4, a DDoS trend that appears to be fueled by an increasing number of targets of greater value in previously underrepresented geographic locations.

In addition, geographical sources of malicious traffic have shifted. The United States and China continued as the lead source countries for DDoS traffic, but instead of the Brazil, Russia, India and China (BRIC) block that dominated in Q3 2014, Q4 DDoS attack traffic came in large part from the United States, China and Western Europe.

A look into botnets

Malware is often used for DDoS botnet expansion. Malware trends – multiplatform, operating system awareness, and destructive malware – are described in the Security Report. In addition, Akamai profiled multiple web application attack botnets using a new analysis technique that takes advantage of data gleaned from the Akamai Intelligent Platform.

The identified botnets were set up to automate the discovery of web application vulnerabilities for Remote File Inclusion (RFI) and Operating System (OS) Command Injection attacks. Akamai researchers profiled the botnets by identifying malicious code resource URLs and payloads that were identical among seemingly unrelated attacks. An attack payload was used to aggregate data and map botnet activity, actors and victim web applications. This profiling technique can help identify more attack sources.

While denial of service attacks impacts site performance significantly, web crawlers can also affect site performance to a lesser degree. The most poorly coded crawlers may even resemble DDoS traffic. Akamai classifies web crawlers based on desirability and impact on site performance.

.

Related content

Rating: 5