Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

FBI Warns of Hacktivist DDoS Attacks, But Says Impact Limited

The Federal Bureau of Investigation (FBI) has issued an alert to encourage organizations to proactively implement distributed denial-of-service (DDoS) attack defenses in the wake of hacktivist assaults, but says incidents so far have had little impact.

The Federal Bureau of Investigation (FBI) has issued an alert to encourage organizations to proactively implement distributed denial-of-service (DDoS) attack defenses in the wake of hacktivist assaults, but says incidents so far have had little impact.

Seeking to overload network resources or consume them to render a target inaccessible, DDoS attacks involve directing to the same system a large amount of network traffic originating from multiple sources operating in concert.

Hacktivists, which the FBI regards as groups of cybercriminals engaging in cyber activities in support of ideological, political, or social causes, are known to have conducted DDoS attacks and other cyber operations following high-profile political, socioeconomic, or world events.

Russia’s invasion of Ukraine was one such event, triggering pro-Russian hacktivist groups to launch DDoS attacks targeting critical infrastructure organizations, albeit with limited success.

Hacktivists, the FBI says in its alert, provide individuals willing to launch cyberattacks on behalf of their cause with the necessary tools, as well as with guidance on cyberattack methodology and techniques.

“DDoS attacks of public facing websites, along with web page and social media profile defacement, are a preferred tactic for many operations. These attacks are generally opportunistic in nature and, with DDoS mitigation steps, have minimal operational impact on victims; however, hacktivists will often publicize and exaggerate the severity of the attacks on social media,” the FBI says.

These actions, the bureau says, often lead to a psychological impact higher than the disruption of service. Moreover, hacktivists have been observed selecting targets based on perceived impact rather than actual service disruption, including high-profile financial, government, health, and transportation entities.

According to the FBI, hacktivists may use open source DDoS services and tools to disrupt public-facing websites, typically claim responsibility for attacks, recycle previously disseminated information to build credibility, and may post news coverage of their assaults, which may lead to copycats targeting the same entities based on received media coverage.

The FBI recommends enrolling in a DDoS protection service, working with the ISP during an assault, implementing a disaster recovery plan to efficiently respond to an attack, and monitoring network assets during and after a DDoS attack, to identify a secondary assault.

Related: US Agencies Issue Guidance on Responding to DDoS Attacks

Related: FBI Warns of Iranian Cyber Firm’s Hack-and-Leak Operations

Related: FBI Warns of Unpatched and Outdated Medical Device Risks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybercrime

Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Cybercrime

A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.