Security

Nine DDoS Threats Your Organization Must Be Prepared For

DDoS

It is critical that your DDoS mitigation solution protect your organization and customers from today and tomorrow’s most sophisticated attacks.

Is your organization prepared to detect and mitigate these threats? Is your organization a “botnet” killer?.. these are some very important questions that need to be addressed by organisations today since the likes of DNS Water Torture attacks, SSL floods, ransom DoS assaults, Advanced Persistent DoS and application flood attacks are some of the threats being faced by one and all.

It’s been felt that preparing for “common” DDoS attacks is no longer enough as the growing array of online marketplaces, makes it possible for hackers to wreak havoc with virtually no knowledge of computer programming or networks. Attack tools and services are easy to access, making the pool of possible assaults larger than ever.

Leveraging burst attacks and Advanced Persistent DDoS campaigns, hackers launch multi-vector, blended campaigns that combine high volume network vectors with sophisticated application-layer attacks. In addition, recent IoT threats have spawned the largest DDoS attacks in history, propelling the market into the 1Tbps DDoS era.

Now more than ever, it’s critical that your DDoS mitigation solution protect your organization and customers from today and tomorrow’s most sophisticated attacks.

The new playgrounds of hackers:

IoT Botnets have earned their “right” as one of the top threats for organizations given the dramatic increase in the use of IoT devices to create powerful botnets. Most notable is the Mirai botnet, used to carry out the largest DDoS attack in history in the fall of 2016. This botnet utilized 60+ factory default credentials found on Busy Box-based IoT devices and created the most powerful botnet seen to date.

Mirai introduced new and sophisticated attack vectors including the Generic Routing Encapsulation (GRE) flood attack and DNS Water Torture attack. With additional botnets uncovered in 2017, including Hajime and BrickerBot, it is clear that the impact botnets will have in cyber security has just begun.

DNS Attacks: DNS is a critical infrastructure component for any organization. While organizations and service providers take security measurements to protect the DNS infrastructure, attackers are generating more sophisticated attacks, with increased impact on the service. Sophisticated attackers take advantage of the DNS protocol behavior to generate more powerful attacks– including DNS WaterTorture and DNS Recursive attacks. Mitigating these attacks requires tools that can learn and gain a deep knowledge of the DNS traffic behavior.

Burst Attacks and Advanced Persistent Denial-of-Service (APDoS) campaigns include short bursts of high-volume attacks in random intervals and attacks that can last weeks, involving multiple vectors aimed at all network layers simultaneously. These type of attacks have a tendency to cause frequent disruptions in a network server’s SLA and can prevent legitimate users from accessing services.

SSL/Encrypted Attacks: With 10% year-over-year growth, attackers are using SSL protocol to mask and further complicate attack traffic and malware detection in both network and application-level threats. Many security solutions use a passive engine for SSL attack protection, meaning they cannot effectively differentiate encrypted attack traffic from encrypted legitimate traffic and can only limit therate of request.

Layer 7 Application Attacks: With the incarnation of IoT botnets, Layer 7 attacks have leveled their prevalence to the one of network attacks (64% of organizations)2. These attacks come in two varieties: application DoS attacks that target resource exhaustion by using the well-known HypertextTransfer Protocol (HTTP), as well as HTTPS, DNS, SMTP, FTP, VOIP and other application protocols that possess exploitable weaknesses, allowing for DoS attacks. Much like attacks targeting network resources, attacks targeting application resources come in a variety of flavors, including floods and“low and slow” attacks.

Ransom DDoS Attacks: In 2016, ransom was the primary attack motivation, accounting for 41%of all cyber-attacks that year.3 Ransom denial-of-service (RDoS) attacks are one form of ransom-based attacks, where perpetrators send an email threatening to attack an organization—rendering its business,operations or capability unavailable—unless a ransom is paid by the deadline. These attacks haveincreased yearly since 2010 and typically come in the form of a volumetric DDoS attack. RDoS attacks are particularly insidious because they do not require the attacker to hack into the target’s network or applications.

Reflection/Amplification Attacks: Reflection and amplification attacks take advantage of a disparity of request and response ratios in certain technical protocols. For instance, the attacker could use a router as an amplifier, taking advantage of the router’s broadcast IP address feature to send messages to multiple IP addresses in which the source IP (return address) is spoofed to the target IP. At high rates,these responses have generated some of the largest volumetric DDoS attacks to date.

Telephony DoS (TDoS) Attacks involve launching high volume of calls against the target network,tying up the system from receiving legitimate calls. In recent years, these attacks have targeted various businesses and public entities, including the financial sector and other public emergency operations interests. In its 2016-2017 Global Application & Network Security Report, Radware predicted that TDoS attacks would rise in sophistication and importance, catching many by surprise.

Dynamic Content and CDN-based Attacks: Organizations often use Content Delivery Network(CDN) providers to support global site and application performance. Trouble is, CDNs provide a particularly insidious cover for attacks as organizations cannot block traffic coming from the CDN’s IP addresses. Malicious actors have made an art form out of spoofing IP addresses to not only obfuscate their identity but also to possibly masquerade as seemingly legitimate users based on geolocation or positive  reputational information about IP addresses, they are able to compromise. Dynamic content attacks further exploit CDN-based protection by overloading origin servers with requests for non-cached content that the CDN nodes passes along.

Conclusion:

In the background of the some of the above-mentioned threats looming large on organisations, without cutting edge technologies they don’t stand a chance today. It’s important to ensure that the chosen solution can protect from these threats, which means a dynamic solution that can keep up with constant changes in attack types and provides full coverage from all forms of DDoS attacks needs to be selected.

Leave a Response