DDoS attacks increase 40% year-on-year

Multi-vector and DNSSEC amplification grew at the fastest rates

Research by Neustar has revealed DDoS attacks are getting more sophisticated as attackers use new methods to bypass defenders and increase the volume of attackers to have a longer-lasting effect on businesses.

"The DDoS attack landscape has become increasingly complex in 2016 because there is no singular goal behind these attacks; some seek to disrupt services, while others serve as smokescreens to breach data," said Rodney Joffe, SVP and Fellow, Neustar. "Organisations must remain vigilant against conventional attacks, even as new threats are realised today and in 2017."

The frequency of attacks has increased 40% year-on-year, while multi-vector attacks have increased more than three-fold in the same period. These attacks have a particularly negative effect because they use a combination of attack mechanisms to confuse defenders and increase attack volume, resulting in a longer-lasting attack. This type of attack accounted for more than half of all DDoS activity investigated by the real-time information and analytics firm.

Another big trend uncovered by Neustar was hackers taking advantage of the weaknesses in DNS and DNSSEC. DNS attacks increased by 648% compared to the same period (January 1st-November 30th) last year. It explained that many attackers using this method leveraged DNSSEC amplification to significantly increase the volume of traffic used in an attack.

Advertisement
Advertisement - Article continues below

Although using the IoT to launch DDoS attacks isn't a new method, the idea of using such technologies to bring down an organisation was realised by Mirai in 2016. It uses IoT device credentials to enrol them into botnets and use them to launch attacks, without the user knowing they are being used to perform attacks.

"Mirai signals a watershed moment for DDoS attacks, where the bad guys finally turned the Internet back on its users," said Joffe. "It is imperative to invest in effective DDoS protection now because the threat landscape has fundamentally changed."

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/business/business-strategy/354195/where-modernisation-and-sustainability-meet-a-tale-of-two
Sponsored

Where modernisation and sustainability meet: A tale of two benefits

25 Nov 2019