DDoS attacks increase 40% year-on-year

Multi-vector and DNSSEC amplification grew at the fastest rates

Research by Neustar has revealed DDoS attacks are getting more sophisticated as attackers use new methods to bypass defenders and increase the volume of attackers to have a longer-lasting effect on businesses.

"The DDoS attack landscape has become increasingly complex in 2016 because there is no singular goal behind these attacks; some seek to disrupt services, while others serve as smokescreens to breach data," said Rodney Joffe, SVP and Fellow, Neustar. "Organisations must remain vigilant against conventional attacks, even as new threats are realised today and in 2017."

The frequency of attacks has increased 40% year-on-year, while multi-vector attacks have increased more than three-fold in the same period. These attacks have a particularly negative effect because they use a combination of attack mechanisms to confuse defenders and increase attack volume, resulting in a longer-lasting attack. This type of attack accounted for more than half of all DDoS activity investigated by the real-time information and analytics firm.

Another big trend uncovered by Neustar was hackers taking advantage of the weaknesses in DNS and DNSSEC. DNS attacks increased by 648% compared to the same period (January 1st-November 30th) last year. It explained that many attackers using this method leveraged DNSSEC amplification to significantly increase the volume of traffic used in an attack.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Although using the IoT to launch DDoS attacks isn't a new method, the idea of using such technologies to bring down an organisation was realised by Mirai in 2016. It uses IoT device credentials to enrol them into botnets and use them to launch attacks, without the user knowing they are being used to perform attacks.

"Mirai signals a watershed moment for DDoS attacks, where the bad guys finally turned the Internet back on its users," said Joffe. "It is imperative to invest in effective DDoS protection now because the threat landscape has fundamentally changed."

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/operating-systems/microsoft-windows/354526/memes-and-viking-funerals-the-internet-reacts-to-the
Microsoft Windows

Memes and Viking funerals: The internet reacts to the death of Windows 7

14 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020