Massive Increase In DDoS Attacks

Businesses are being changed by the economics of the Coronavirus-driven lockdown and for those trying to work online there has been a significant increase in Distributed Denial of Service (DDoS) attacks, according to network infrastructure service provider Voxility.

The profile of the operations targeted is typically large Hosting Providers with global operations. 

According to Voxility's data, attacks peaked at 1,035 gigabits per second (Gbps) and 1,044 Gbps on September 3 and September 4, 2020, accompanied subsequently by lower intensity attacks of 798 Gbps and 854 Gbps more recently. Voxility has helped mitigate the attacks, which it says last 15 minutes on average. 

Working from home, online learning and increased video demand meant that some network operators have been working hard to keep up throughout 2020. Unfortunately, contrasting reports about post-outbreak DDoS activity from the major DDoS industry players could mean that it will be some time before the currents wave attacks into an informative context that fits consistently with the statistical trends of recent years.

These were made up of volumetric User Datagram Protocol (UDP) flood, comprising abnormally large UDP packets, DNS amplification, and UDP packets without payload, in an attempt to overwhelm infrastructure ports with IP traffic. UDP is a communications protocol that is primarily used for establishing low-latency and loss-tolerating connections between applications on the internet. It speeds up transmissions by enabling the transfer of data before an agreement is provided by the receiving party.

There were more than 600 different originating source IPs per DDoS event and it seems likley that more large DDoS attacks should be expected in coming weeks. 

Voxility, who rent and sell hardware, network equipment, Internet access and DDoS security services, says, “The motivations behind these waves of DDoS attacks are uncertain at this point. Whether they are caused by extortion attempts or simply seeking to disrupt the hosting provider’s operations, very large volumetric DDoS attacks are occurring often across networks...... In August alone, Voxility saw more than 30 attack waves that surpassed 500Gbps in volume intensity, while at least six to seven events out of these where higher than 700Gbps. This is in contrast to what has been reported by website security companies in 2020 who have seen a more frequent, but lower-intensity attack landscape for DDoS.” 

The geographical origin of these attacks is currently under investigation, but worryingly for service providers, the frequency of these attacks has increased coinciding with the global pandemic. 

Voxility:      Search Networking:       Capacity Media:    TechRadar:           Cloud7

You Might Also Read: 

Latest Cyber Security Threats & Trends: 2020 In Review:

 

« TikTok’s Indian Rival Ready For Testing
Social Media Networking Sites You Need to Know About - part 1 »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Agesic

Agesic

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay.

Thridwayv

Thridwayv

Thirdwayv helps your enterprise realize the full potential of loT connectivity. All while neutralizing security threats that can run ruin the customer experience - and your reputation.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

StrikeReady

StrikeReady

StrikeReady have developed CARA, an advanced technology solution that offers personalized and proactive assessment and remediation of future and current risk in real-time.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

Utilize

Utilize

Utilize is an award-winning technology company with over 25 years of industry expertise, we support hundreds of businesses across London and the South East.