Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/26/2014
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NSFOCUS DDoS Threat Report 2013: Nearly 28 Attacks Per Hour

'Hackernomics' drives smaller, shorter and repeated attacks for better efficiency

SANTA CLARA, Calif. – March 25, 2014 – NSFOCUS Information Technology Co., Ltd. (NSFOCUS), a global provider of solutions and services for distributed denial-of-service (DDoS) detection and mitigation, today released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year. The report expands on the top 10 findings released in February to include statistical analysis and key observations based on the 244,703 DDoS incidents observed by the NSFOCUS Threat Response and Research (TRR) team or mitigated by the Managed Security Service (MSS) team for NSFOCUS customers and partners around the world. These customers span tier-1 and tier-2 data centers and hosting companies to large enterprises across all industries.

Observations indicate that DDoS attacks are maturing in the era of advanced persistent threats (APT). DDoS attacks have been used as smokescreens to carry out APT attacks or for other malicious purposes. The report also notes the availability of DDoS-as-a-service, which affords anyone with a computer and a credit card the ability to carry out an attack. Finally, DDoS amplification attacks will continue to present a challenge, as the March 2013 attack on anti-spam organization Spamhaus proved, in which traffic reached 300 Gbps. However, the potential for more severe DDoS amplification attacks, such as ones leveraging the network time protocol (NTP), can far exceed the bandwidth levels seen to date. 

“DDoS is quickly becoming a common pain point, and businesses need to take this threat seriously if they expect to provide uninterrupted service to their customers,” said Frank Ip, vice president of U.S. operations for NSFOCUS. “In 2013, cyberattackers gave the market a lesson in ‘hackernomics’ and showcased the myriad ways in which they have evolved their attack strategies to deploy sophisticated techniques that will inflict the maximum amount of damage using the fewest resources. The more we learn about attack mentality, the stronger our defenses become.”

Findings reveal that “hackernomics” is driving an overarching DDoS trend of smaller, shorter and repeated attacks. The purpose of most attacks is to disrupt, not to destroy. As such, small application-layer or hybrid attacks, which are cheaper to launch, can cause substantial damage to network resources. Domain name system (DNS) attacks increased as a result of advancements in anti-DDoS technologies that can better counter other attack vectors, and DNS infrastructure continues to remain one of the weakest links.

To obtain your copy of the report, visit here.

 

Additional resources:

Twitter: https://twitter.com/NSFOCUS_Intl

Facebook: https://www.facebook.com/nsfocus

Blog: http://nsfocusblog.com/

 

About NSFOCUS

Founded in 2000, NSFOCUS Information Technology Co., Ltd. (NSFOCUS) provides enterprise-level carrier-grade solutions and services for distributed denial-of-service (DDoS) mitigation, Web security and enterprise-level network security. With more than 13 years of experience in DDoS research, development and mitigation, NSFOCUS has helped customers around the world maintain high levels of Internet security, website uptime and business operations to ensure that their online systems remain available. The NSFOCUS Anti-DDoS System (ADS) empowers customers to find and fend off a variety of incidents, from simple network-layer attacks to more sophisticated and potentially damaging application-layer attacks, all while guaranteeing legitimate traffic gets through to networks and corporate-critical systems. For more information, visit www.nsfocus.com.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
CVE-2020-26890
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...