Cybercrime

DDoS Hacktivism is Back With a Geopolitical Vengeance

DDoS attacks have evolved from social protests through criminal extortion, hack attack smokescreens and competitor suppression to geopolitical vengeance.

Distributed denial of service (DDoS) attacks have evolved from social protests through criminal extortion, hack attack smokescreens and competitor suppression to geopolitical vengeance. All these drivers currently coexist, but aggressive geopolitical revenge now dominates.

This is the primary conclusion to be drawn from StormWall’s Q4 2023 review of global DDoS attacks. StormWall, based in Bratislava, Slovakia, offers a DDoS protection service delivered through a global network of scrubbing centers.

The effect of geopolitics is clearly seen in the timing and volume of current attacks against Israel. In Q3, 2023, less than 1% of global attacks targeted Israel. But following the Hamas raid on October 7, 2023, and the retaliatory invasion of Gaza by the Israeli military, this number leapt to 10.6% — with size and durations ranging from 1.2 Gbps to 135 Gbps, and from a few minutes to 24 hours. In Q4, 2023, tiny Israel became the fourth most DDoS attacked nation in the world, behind China (12.6%), USA (12.2%) and India (11.7%). 

Other indications of a geopolitical motivation behind DDoS attacks can be seen in the individual targets. StormWall’s figures show that government (21% of attacks), retail (17%), telecommunications (15%), finance (12%), and energy (9%) are the five most attacked sectors. All but retail could be described as mainstream critical infrastructure and are primary targets for any attacker wishing to inflict economic damage and disturbance on an enemy. These targets further support the idea that DDoS hacktivism is now largely driven by geopolitical vengeance.

Retail is a bit of an anomaly. Attacking individual shops or retail chains would disrupt the companies, but not the economy. Compare the economic effect to that of taking down large swathes of the internet through targeting telecommunications.

For retail, all Q4 figures are disturbed by the holiday season, but it is still anomalous. StormWall posits the possibility that retail DDoS figures are affected by several non-geopolitical attacks: over-aggressive competitors.

It is impossible to determine the individual actors behind a DDoS attack without their public claim of responsibility (Killnet?). Only the target is clear. However, in the same way that malware researchers detect clues allowing them to suggest ‘with some confidence, we believe that nnn group is behind this attack’, so too can DDoS defenders point the finger in general directions.

In the case of retail, StormWall CMO, Daniil Korolev, told SecurityWeek that monitoring the IT Army of Ukraine (the world’s largest semi-visible group of geopolitical activists) shows no geopolitical interest in targeting retail. “These guys have certain patterns in their attacks. By cross examination we can deduce they have almost zero interest in retail. You can be pretty sure that retail is attacked by competitors because they are never of interest to a hacktivist group — they’re just not that interesting.” 

Advertisement. Scroll to continue reading.

If not geopolitics, what motivations remain? The primary options are criminals for extortion (the loss of e-commerce sales during the holiday season could be critical), and unfair competitors.

Further indications of the vengeance motive can be seen in the dominance of government as an attack sector, and the rapid rise of the energy sector. Twenty-one percent of all attacks were against the government sector, with a 162% year on year increase. “These attacks, first focused mostly on Europe, have now spread to the Middle East due to the Israel-Palestine conflict,” says StormWall. European targets were probably in response to UK and EU support for Ukraine, but the focus has now shifted to Israel.

The energy sector has also seen an escalation in attacks – a 109% increase year on year, now representing 9% of all attacks. The energy sector serves as both a target for, and a source of, DDoS attacks. “Attackers are also targeting IoT devices used in energy plant operations to initiate further botnet attacks,” warns StormWall.

Eighty-six percent of all attacks were HTTP/HTTPS attacks, while 9% targeted TCP/UDP. However, StormWall calls attention to the growth in DNS laundering (where attackers bombard DNS servers with requests for random subdomains), and mDNS attacks that exploit local network protocols to amplify attacks.

More specifically, the firm notes, “There’s been an increase in botnet, DNS amplification, and multi-vector attacks. Notably, Hyper-Volumetric HTTP DDoS attacks exploited the HTTP/2 rapid reset flaw.” Most of the attacks are short in duration, lasting less than 30 minutes. Such attacks are often designed to test the target’s defenses, before a larger assault is launched.

Nobody is immune from a DDoS attack. While geopolitics dominates the attack motivation, it is not the only motivation. The entertainment industry is still subject to criminal extortion. The retail, finance, and logistics sectors all saw a spike in attacks during key shopping periods like Black Friday and the Christmas-New Year season, “often driven by competitors”, suggests StormWall.

“Our data from Q4 2024 clearly demonstrates how quickly the threat landscape can evolve in response to global events,” warns Ramil Khantimirov, CEO and co-founder of StormWall. “If online infrastructures aren’t prepared now, setting up DDoS protection becomes much harder once they’re targeted.” Preparation to defend against DDoS is a better tactic than hope.

Related: Were 3 Million Toothbrushes Really Used for a DDoS Attack?

Related: MySQL Servers, Docker Hosts Infected With DDoS Malware

Related: Major ChatGPT Outage Caused by DDoS Attack

Related: Organizations Respond to HTTP/2 Zero-Day Exploited for DDoS Attacks

Related Content

Cloud Security

SecurityWeek speaks to Tom Scholl, VP and distinguished engineer at AWS, on how the organization tackles IP Spoofing and DDoS attacks.

Network Security

New HTTP/2 DoS method named Continuation Flood can pose a greater risk than Rapid Reset, which has been used for record-breaking attacks.

Network Security

CISA, the FBI, and MS-ISAC have released new guidance on how federal agencies can defend against DDoS attacks.

Cybercrime

A group of hackers called Anonymous Sudan, considered by cybersecurity experts as pro-Russia, claimed responsibility for the attacks in online posts.

IoT Security

Three million electric toothbrushes were reportedly used for disruptive DDoS attacks, but cybersecurity experts questioned the claims.

Cloud Security

Researchers warn attackers are targeting MySQL servers and Docker hosts to plant malware capable of launching distributed DDoS attacks.

Artificial Intelligence

ChatGPT and its API have experienced a major outage due to a DDoS attack apparently launched by Anonymous Sudan.

Cybercrime

The Associated Press news website experienced an outage that appeared to be consistent with a denial-of-service attack.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version