The Growing Sophistication Of Distributed Attacks

  /     /     /  
Publicated : 22/11/2024   Category : security


The Growing Sophistication Of Distributed Attacks


Botnet and DDoS attacks growing more advanced and more crucial than ever to cybercriminals attack strategies.



As the number of traditional distributed denial of service (DDoS) and botnet attacks keeps inching upward, attackers are also tinkering with the technology and strategy behind these attacks to supplement more advanced criminal assaults on organizations.
Several new reports out over the last few days paint an interesting picture of how these distributed attack patterns are converging.
First, as a level set, a
report out today from Neustar
shows that DDoS attack volumes and intensities are stronger than ever. The study showed that 73% of global brands reported a DDoS attack in 2015, and over eight in 10 corporations were struck by multiple DDoS attacks. In fact, 45% of organizations said they were hit by DDoS attacks six or more times last year.      
The study found that 42% of companies took three or more hours to detect a DDoS attack on their infrastructure and about half of organizations reported that an hour of outages related to DDoS racked up $100,000 in revenue loss. But outages are now just a small piece of the puzzle, the report relates. Approximately 57% of all incidents involving DDoS attacks resulted in some sort of theft, be it of customer data, intellectual property, or direct financial theft.  
Neustars researchers say that while the early goals of DDoS was simply to take a website offline, these days attackers are increasingly using them as an important way to diversify their infiltration tactics. Attackers carry out a series of coordinated DDoS strikes to keep the IT departments guessing where and when the next attack will take place, and use them to hide other attack techniques with the goal of a cyber heist.
“The findings of our most recent report are clear: attacks are unrelenting around the world, but organizations are now recognizing DDoS attacks for what they are -- an institutionalized weapon of cyber warfare, says Rodney Joffe, head of IT security research at Neustar.
Meanwhile, a
report out yesterday from ThreatMetrix
shows that attackers are getting creative about how they utilize the bot networks that power DDoS attacks to branch out into new attack patterns designed to look more like normal user behavior and are harder to detect. 
Botnet attacks have evolved from just being large volume distributed denial of service (DDoS) or spam attacks, to low-and-slow bots, designed to evade rate and security control measures and mimic trusted customer behavior / login patterns, the report explained.
Gain insight into the latest threats and emerging best practices for managing them. Attend the
Security Track
at Interop Las Vegas, May 2-6.
Register now
!
For example, ThreatMatrix researchers have been tracking the trend of fraudsters utilizing botnets to take lists of stolen user credentials acquired from the Dark Web in order to launch wide-scale credential-testing sessions among e-commerce merchants. These attacks will cause huge transaction spikes over the course of a few days, but at that point, the attackers will have a curated list of known good password and login combinations that they can use on other sites to launch lower-intensity attacks.
These attacks are particularly hard to detect because they aren’t always picked up by traditional rate control measures. Our normal lines of defense just aren’t working. Businesses need a smarter approach that can differentiate between a human and a bot the moment they start to transact,” says Vanita Pandey, vice president, strategy and product marketing at ThreatMetrix.
Researchers with Forcepoint today also hinted at investigations theyre making into botnet advancement with some early details of an on-going botnet campaign called JAKU, which they say is helping attackers better target attacks on specific victims in order to steal data
JAKU herds victims en masse and conducts highly targeted attacks on specific victims through the execution of concurrent operational campaigns, explains the
Forcepoint 2016 Global Threat Report
.
Forcepoint says JAKU has claimed 19,000 victims across 134 countries so far, but technical details are still forthcoming next month from the firm.
Related Content:
How To Prepare For A DDoS Attack: 10 Steps
7 Ways Banking Botnets Are Keeping With The Times
Majority Of Bad Bots Behave Like Humans
Hacker 2016 To-Do List: Botnet All The Things!
 
 

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
The Growing Sophistication Of Distributed Attacks