Public cloud used to power supercharged DDoS attacks

A quarter of DDoS attacks are launched using public cloud services, with Microsoft Azure the most commonly used

Azure interface

Public cloud is increasingly being used by hackers to launch DDoS attacks, with a quarter of criminals using such services to launch malicious attacks between July 2017 and July 2018.

This has increased significantly compared to the previous 12 months when just 18.5% of attacked exploited public cloud services, according to research by Link11's Security Operation Center (LSOC). 

Microsoft Azure was the most used platform abused by hackers, with 38.7% of attacks originating from there, while AWS was used in 32.7% of incidents. Google lagged behind, being used for 10.7% of attacks.

"The people behind DDoS attacks are embracing the use of public cloud services for the same reasons as legitimate organisations: the services provide flexible, on-demand capacity and resources, and can be provisioned in just a few minutes," said Aatish Pattni, regional director, UK & Ireland at Link11.

"For threat actors, the benefits are even more compelling because they will often use stolen credit card details and false identities to pay for the services. This makes the perpetrators almost impossible to trace, even though providers such as Amazon are taking strong action against misuse, and asking users to report any suspected abuse of their services."

Link 11 said public cloud proves particularly popular with hackers because of speed. Offering bandwidth of between 1 and 10Gbps, public cloud services provided by the most widely used providers allow criminals to shoot 1,000 times as many bots at websites they want to attack compared to using individual devices such as IoT equipment, it added. 

However, Link11 warned that there is little businesses can do to prevent malicious actors from using public cloud implementations to launch attacks as they're commonly using the same platforms for their infrastructure. Instead, the company advises businesses to better analyse communication between their public cloud service and their own network so anomalies can be picked up and dealt with quickly. 

Featured Resources

Edge-enabled mobility of the future

Turning vehicle data into value

Download now

Modern networking for the borderless enterprise

Five ways top organisations are optimising networking at the edge

Download now

Address multi-cloud configuration risks

Cloud security challenges and how to overcome them

Watch now

The total economic impact of IBM Security Verify

Cost savings and business benefits enabled by IBM Security Verify

Download now

Most Popular

UK gov flip-flops on remote work, wants it a standard for all jobs
flexible working

UK gov flip-flops on remote work, wants it a standard for all jobs

5 Mar 2021
Star Alliance passenger data stolen in SITA data breach
data breaches

Star Alliance passenger data stolen in SITA data breach

5 Mar 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021