Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

DDoS Attacks Occur on Average Every 2 Minutes, Security Firm Finds

Every two minutes, a distributed denial-of-service [DDoS] attack is occurring somewhere on the Web – actually 1.29 DDoS attacks to be exact.

Every two minutes, a distributed denial-of-service [DDoS] attack is occurring somewhere on the Web – actually 1.29 DDoS attacks to be exact.

According to a DDoS threat report (PDF) from security vendor NSFOCUS detailing attack trends gleaned from observing 168,459 attacks during the first half of the year, most of the incidents are relatively short and small. Some 93.2 percent of the attacks last less than 30 minutes, and 80.1 did not surpass a traffic rate of 50 Mbps.

Unfortunately for victims, 68.7 percent suffered more than attack, a figure that is up nearly 30 percent compared to 2012. Only 31.1 suffered a single DDoS attack, which was down from nearly 50.7 percent last year.

Among the 90 high-profile attacks reported by the media – such as attacks by hacker groups like Izz ad-Din al-Qassam Cyber Fighters and Anonymous – the report found that 91.1 percent of the incidents were motivated by hacktivism.

“Profit-driven cybercriminals pay close attention to ‘hackernomics,’ deploying whatever form of attack causes the most damage with minimal effort,” said Frank Ip, vice president of U.S. operations for NSFOCUS, in a statement. “For this reason, we expect application-layer attacks to remain the most common method of attack in the near term, and we anticipate a greater adoption of this method in the future.”

According to NSFOCUS, TCP Flood and HTTP Flood remained the most popular attack methods, and accounted for 38.7 percent and 37.2 percent of attacks, respectively. Hybrid attacks also became more prevalent, with ICMP+TCP+UDP Flood serving as the most common combination.

Increasingly, denial-of-service attacks are occurring from and within online gaming communities, according to a new report from DDoS-mitigation firm Prolexic. The attacks have been used against other gamers, gaming platforms and third-party targets such as financial services and other businesses, the company noted.

In one example, the attackers increased the power of their attack against a financial services firm with reflection and amplification techniques. Sending a small request to one gaming server produced an outsized response that was five times larger than the initial request. The attackers then co-opted hundreds of gaming servers to produce the same outsized responses at once and against the financial firm.

Advertisement. Scroll to continue reading.

“This attack targeted Call of Duty 2 gaming servers across the globe – in South Africa, Europe, Asia and the United States,” said Stuart Scholly, president of Prolexic, in a statement..  “PLXsert has replicated the attack in our lab.”

“DDoS attacks fueled by rivalries, poor password security protocols and readily available DDoS tools are widespread and harm gaming and non-gaming targets alike,” Scholly said. “There are serious repercussions for every industry from denial of service attacks that feed off the explosive growth of online gaming infrastructures.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.