Attacks/Breaches
5/2/2017
05:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

DDoS Attacks Surge, Organizations Struggle to Respond

Organizations often discover a DDoS attack only after being alerted to the fact by a third-party or customer, Neustar survey shows.

Despite heightened awareness of distributed denial-of-service (DDoS) attacks, organizations are taking longer to detect and respond to them.

Neustar, as it has done the previous three years, surveyed some 1,010 CISOs, CIOs, CTOs, and other corporate executives from around the world on the frequency and impact of DDoS attacks on their organizations. About 50% of the respondents identified themselves as belonging to companies with revenues of between $500 million and $1 billion.

The results show that DDoS attacks have increased in frequency and volume even as organizations are struggling to detect and mitigate them quickly. About 850 respondents, or 84% of the total, say their organizations have experienced at least one DDoS attack in the past 12 months, compared to the 73% who said the same thing in last year’s survey.

Eighty-six percent of those 850 organizations say they have contended with multiple DDoS attacks over the past year. That number represents a 4% increase over the proportion of organizations who say they had experienced more than one DDoS attack last year.

Nearly half of the impacted organizations say their DDoS attacks coincided with some form of breach or malicious activity on their networks, including data theft and ransomware. For instance, 47% report discovering virus activity on their network after a DDoS attack, 43% cite malware as being activated, and 32% report customer data theft.

The survey found that in many cases victim organizations did not know they were the targets of a DDoS attack until a third-party or  a customer alerted them. In fact, about one in 5 victim organizations over the past year learned about a DDoS attack only after being notified about it by an external third-party or by their customers.

Hours to ID a DDoS

Globally, slightly more than half of all organizations that sustained a DDoS attack required a minimum of three hours to positively identify it, while 38% say it took them between three and five hours. On average, victims needed about three hours to respond to a DDoS attack, which was slower overall than the response times reported by respondents in last year’s survey.

The numbers are significant because of the potential losses that companies can experience as the result of a DDoS attack. More than 6 in 10 of the organizations surveyed estimate they would lose up to $100,000 in revenue per hour in the event of a disruption caused by a DDoS attack. Some 31% say they could lose between $250,000 to $1 million per hour, while 12% claim potential revenue losses of over $1 million per hour.

Inexperience dealing with DDoS attacks could be one reason for the delayed detection and response, says Barrett Lyon, Neustar’s head of research and development. Another is that large attacks that take infrastructures offline are rather easy to detect, but smaller ones are much harder to pin down.

"To those who have limited experience in mitigating attacks or have low-end protection, small complex attacks may be initially treated with performance investigations and diagnostics before arriving at the conclusion of an attack," Lyon says. "Unfortunately, many types of DDoS attacks ramp up quickly and can be over in a matter of minutes."

This can be, fast enough to bypass detection but long enough for external users to notice especially if the target is a Web-based service such as online banking, airline reservations, or utility payment systems.

Spike in Connectionless LDAP DDoS Attacks

The Nesutar survey uncovered a significant increase in DDoS attacks involving the abuse of the Connectionless LDAP (CLDAP) protocol in the first quarter of 2017. CLDAP is a version of LDAP that many organizations use for directory services — and inadvertently also leave exposed to Internet access.

Unlike LDAP, which uses the Transmission Control Protocol (TCP) for communication, CLDAP uses the less secure User Datagram Protocol (UDP), making it somewhat easier to exploit in DDoS attacks.

Earlier this year, content distribution network Akamai published an alert noting a substantial increase in CLDAP-enabled DDoS attacks over the past several months. The company had described the new trend as troubling because of the extent of attack traffic amplification an attacker could achieve by exploiting CLDAP services that were exposed on the Internet.

In a similar report, security vendor Corero Network Security reported seeing a remarkable 416 CLDAP attacks since last October. The largest of these attacks had a peak bandwidth of 33Gbps, while the average volume was around 10Gbps.

Neustar says the largest CLDAP-enabled DDoS attack it has mitigated so far this year had a peak bandwidth size of 20.9 Gbps and lasted 14 minutes. In terms of size, that was much smaller than some of the terabit-scale DDoS attacks generated by the Mirai-botnet last year. Still, the incident demonstrated that CLDAP attacks can generate considerable momentum and are something to keep an eye on for the rest of the year, according to Neustar.

"A few years ago, a two gigabits-per-second attack could be quite disruptive, but its size was restricted to the amount of resources that could be economically and electronically marshaled," Lyon says. "Now, attackers can leverage resources such as web domains that use DNS Security Extensions [DNSSEC] to create tremendous amplification."

He points to a Neustar study last year, which identified a typical amplification factor of 29 for an 80-byte query: The largest attack was a 217-time amplification of an 80-byte query. "Better economics, more potent DDoS creation code being shared, and many [easily exploitable] are driving up attack size," he warns.

Nuestar's survey also suggests that the growing deployment of Internet of Things (IoT) devices such as connected sensors and actuators will pose new DDoS-related challenges for organizations. Of the organizations using IoT devices that became victims of a DDoS attack last year, 32% report damage to physical equipment, or a network compromise.

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cybersecurity's 'Broken' Hiring Process
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/11/2017
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Search Cybersecuruty and you will get unicorn.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.