Just in:
NEOM welcomes leading industry figures and investors to Hong Kong showcase as part of its ‘Discover NEOM’ China tour // Qmiax Exchange: Shaping a New Future of Secure and Compliant Cryptocurrency Trading // Crypto Giant Binance Takes Flight in Dubai, Targets 200 Million Users Worldwide // Global Energy Leaders Chart Course for Sustainable Future at IRENA Assembly // Get Based with Mr. Based: The Future of Community-Driven Cryptocurrency // Andertoons by Mark Anderson for Sat, 20 Apr 2024 // Evolution and current state of global crypto adoption – Octa // UN Acknowledges Uneven Progress on Energy Goals During Sustainability Week // Qmiax Exchange Drives Global Cryptocurrency Compliance Process // UAE Delegation Engages in Arab Parliament Committee Discussions // Bitcoin Halving Fails to Ignite Immediate Price Surge // VinFast expands access to comprehensive aftersales network in France and Germany through agreement with Mobivia // Imperative of Action Against Dubious Kuki-Chin Armed Movement // Abu Dhabi Environment Agency Endorses ADNOC’s Decarbonization Push // Congress Is Set To Perform Well In Lok Sabha Polls In Karnataka // Departure Numbers Take Flight at Dubai Airports // Skies Clear for Emirates as Airline Resumes Normal Operations // NTT pioneers new Direct Liquid Cooling Technology and High Performance Computing (HPC) as-a-Service Solution in Hong Kong // Unexplained Blast Rocks Pro-Iran Militia Base in Iraq // Emirates Offer Support as Wildfires Ravage Greece //

Today's leading causes of DDoS attacks

global network istock

Last fall, we saw the biggest distibuted denial of service (DDoS) attack ever. This year we’ll see even bigger ones. According to Akamai‘s latest State of the Internet Security report, here’s what’s behind them.

Akamai DDoS Attack Vectors

Behind today’s DDoS attacks you’ll find botnets and they’re using the same old techniques hackers have always used to bring down your servers.


Akamai

First, you should know that while the total DDoS attacks only increased by 4 percent from Q4 2015 to Q4 2016, there was a 140 percent increase in attacks greater than 100 gigabits per second (Gbps). In short, we’re not seeing that many more DDoS assaults, but they are getting much worse.

ADVERTISEMENT

Of the most recent mega 100Gbps attacks in the last quarter, most of them were directly attributed to the Mirai botnet. The Mirai botnet works by exploiting the weak security on many Internet of Things (IoT) devices. The program finds its victims by constantly scanning the internet for IoT devices, which use factory default or hard coded usernames and passwords.

It’s hard to detect infected IoT gadgets because, unlike PCs, an infected webcam or DVR doesn’t show its owner any symptoms. More annoying still, while simply rebooting a device will usually get rid of the Mirai malware, without a firmware update, it’s still wide open to being re-infected.

Mirai won’t go away anytime soon. Its source code was released last fall and hackers are using it to create their own variants. As James Scott and Drew Spaniel of the Institute of Critical Infrastructure Technology reported in their white paper, Rise of the Machines: The Dyn Attack Was Just a Practice Run, “the Mirai malware offers malicious cyber actors an asymmetric quantum leap in capability; not because of sophistication or any innovative DDoS code, rather it offers a powerful development platform that can be optimized and customized.”

Don’t get too focused on Mirai. Scott and Spaniel continued: “Mirai will not forever remain the favorite tool of unsophisticated malicious threat actors. In fact, due to a saturated pool of bot victims, script kiddies have already begun adapting the malware to new victim hosts or adopting new malware altogether.”

As Akamai noted, last quarter’s biggest attack, which topped out at 517Gbps, didn’t come from Mirai. Instead, it arose from an older botnet powered by embedded Linux-based BillGates and xor malware/botnet pairing.

Besides, as more and more insecure IoT devices are added to the internet, they create an ever-growing pool of attack resources. Akamai explained, “As vulnerable devices are added to IoT-based botnets, we expect a second surge in botnet capabilities and DDoS attack size.”

These devices, and older DDoS attack agents use a variety of attack methods. By Akamai’s latest count, the top three attack methods are User Datagram Protocol (UDP) fragmentation, 27 percent; Domain Name Server (DNS), 21 percent; and Network Time Protocol (NTP), 15 percent.

Sound familiar? They should. While the primary source of DDoS attacks have become botnets, the methods remain largely the same.

What can be done about this? There are things you can do to protect your servers, but the real answer must come from hardware original equipment manufacturers (OEMs).

Akamai’s simple solution is: “IoT devices should ship preconfigured with per-device random passwords or they should require owners to change the password on the initial login.”

Simple right? But until consumer electronics vendors start taking security seriously, there will be larger and larger DDoS attacks.

Related Stories:

(via PCMag)

ADVERTISEMENT

ADVERTISEMENT
Just in:
Abu Dhabi Environment Agency Endorses ADNOC’s Decarbonization Push // Dubai Airports Sees Departure Efficiency on the Rise // A Feast Without Footprint – Shiok Kitchen Catering Redefines Delicious Dining with Carbon Neutral Catering // Get Based with Mr. Based: The Future of Community-Driven Cryptocurrency // Congress Is Set To Perform Well In Lok Sabha Polls In Karnataka // UN Acknowledges Uneven Progress on Energy Goals During Sustainability Week // Boeing Eyes 2030 Launch for Electric Flying Cars // NTT pioneers new Direct Liquid Cooling Technology and High Performance Computing (HPC) as-a-Service Solution in Hong Kong // Qmiax Exchange Drives Global Cryptocurrency Compliance Process // Sharjah Charity International Extends Helping Hand to Flood Victims // NEOM welcomes leading industry figures and investors to Hong Kong showcase as part of its ‘Discover NEOM’ China tour // Emirates Offer Support as Wildfires Ravage Greece // Skies Clear for Emirates as Airline Resumes Normal Operations // UAE Delegation Engages in Arab Parliament Committee Discussions // Bitcoin Halving Fails to Ignite Immediate Price Surge // Hong Kong’s R&D Receives International Recognition HKPC’s “InspecSpider” Wins Prestigious “Edison Award” in Innovation Field // Evolution and current state of global crypto adoption – Octa // Innovative Study On Solvent Recycling In Warfare Published // Imperative of Action Against Dubious Kuki-Chin Armed Movement // Andertoons by Mark Anderson for Sat, 20 Apr 2024 //