Conflict Drives A Significant Increase In DDoS Attacks

Of the many types of criminal activity that occur on the web, few are more difficult to prevent than Distributed Denial of Service (DDoS) attacks and attackers are successful in the use of these techniques to frustrate and extort vulnerable targets.

These attacks can bring down even the largest websites by overloading servers with more requests than they can handle. Unable to meet the demand of junk requests, servers crash and often require hours to restore. For this reason, tracking DDoS trends is an important function of threat intelligence.

Now, data analysis carried out by NETSCOUT reveals a large increase in DDoS attacks and identifies is a significant link between geopolitical conflicts and these types of attacks.

Since 2021, DDoS attacks have trended upwards, both in volume and frequency. Layer 7 DDoS attacks of at least 500,000 requests per second (RPS) increased 81% in the past year. "By constantly innovating and adapting, attackers are designing new, more effective DDoS attack vectors or doubling down on existing effective methodologies," said Richard Hummel, threat intelligence lead, NETSCOUT. 

In the first half of 2022, attackers conducted more pre-attack reconnaissance, exercised a new attack vector called TP240 PhoneHome, created a tsunami of TCP flooding attacks, and rapidly expanded high-powered botnets to plague network-connected resources. “In addition, bad actors have openly embraced online aggression with high-profile DDoS attack campaigns related to geopolitical unrest, which have had global implications." Hummel added

In addition to greater frequency, attack sizes were larger in 2022 than in 2021. The largest attack in 2022 was 4.5X larger than the biggest attack in 2021. In Q2 2022 alone, applications security firm Imperva detected and mitigated record-breaking DDoS attacks that were able to maintain extremely high rates over a period of several hours as opposed to only minutes.

A significant underlying aspect driving the increase is the geopolitical conflict impacting the dynamics of the online conflict in the war between the Ukraine and Russia. 

According to NETSCOUT, since Russia invaded Ukraine over a year ago, cyber attacks have become a major part of Russia’s attack tactics. As Ukrainian Internet systems relocate to other countries to ensure connectivity, threat actors followed them, launching DDoS attacks against the nations offering support to the besieged nation. The war has resulted in 66% of businesses changing their cyber security strategies, and 82% of security professionals today believe that geopolitics and cyber security are intrinsically linked, as reported on by securitybrief.com.

In evidence, after Ireland welcomed numerous Ukrainian refugees last year, there was a 200% increase in attacks against organisations in the country. Similarly, as tensions have increased between Taiwan, China, and Hong Kong in 2022, DDoS attacks against Taiwan have occurred with increasing frequency.

NETSCOUT:      F5 Labs:     I-HLS:    Imperva:     Imperva:     Comparitech:  

You Might Also Read: 

Reduce Vulnerabilities & Defend Your Brand Against DDoS Attacks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A New Tool For Protecting ML Systems Security
Meta Plans A Rival To Twitter  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

WEBINAR: What Is A Next-Generation Firewall (and why does it matter)

WEBINAR: What Is A Next-Generation Firewall (and why does it matter)

Webinar Thur Apr 20 - join us to hear security experts from SANS and AWS break down the myths and realities of what an NGFW is and what one can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

Unitrends

Unitrends

Unitrends helps IT pros do more with less by providing an all-in-one enterprise backup and continuity solution.

Sothis

Sothis

Sothis is an information technology services company offering a range of solutions including cybersecurity, managed security services, information governance and compliance.

Digital Resolve

Digital Resolve

Digital Resolve delivers solutions that help companies maintain trust and confidence through proven and cost-effective fraud-protection and identity intelligence technology.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

spriteCloud

spriteCloud

spriteCloud is an independent software testing, test automation and cybersecurity services provider.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

Coretelligent

Coretelligent

Coretelligent is a leading providers of Managed and Co-Managed IT, cybersecurity and private cloud services.

Crayon

Crayon

Crayon is a customer-centric innovation and IT services company. We provide guidance on the best solutions for our clients’ business needs and budget with software, cloud, AI and big data.