Organizations during the third quarter experienced on average 237 DDoS attack attempts each month, equivalent to eight DDoS attack attempts each day.

This figure represents a 35% increase in monthly attempts compared to just the previous quarter. These shocking findings come from the latest DDoS Trends and Analysis Report from Corero Network Security. They claim the rate of DDoS attacks is being spurred by the growing availability of DDoS-for-hire services and the explosion of unsecured Internet of Things (IoT) devices.

These weak IoT devices are infected by botnets, like for example the Reaper botnet, which has already infected thousands of devices and is believed to be dangerous because it’s able to utilize security flaws in the code of these unsecured machines. Similar to a computer worm, the botnet hacks into IoT devices and then hunts for new devices to infect in order to spread itself further.

Ashley Stephenson, CEO at Corero claims, “The growing availability of DDoS-for-hire services is causing an explosion of attacks, and puts anyone and everyone into the crosshairs. These services have lowered the barriers to entry in terms of both technical competence and price, allowing anyone to systematically attack and attempt to take down a company for less than $100. Alongside this trend is an attacker arms race to infect vulnerable devices, effectively thwarting other attackers from commandeering the device.  Cyber-criminals try to harness more and more internet-connected devices to build ever larger botnets.  The potential scale and power of IoT botnets has the ability to create internet chaos and dire results for target victims.”

Corero data also found that hackers are executing sophisticated, quick-fire, multi-vector attacks against organizations security. Stephenson added, “Cyber-criminals have evolved their techniques from simple volumetric attacks to sophisticated multi-vector DDoS attacks. Often lasting just a few minutes, these quick-fire attacks evade security teams and can sometimes be accompanied by malware and other data exfiltration threats. We believe they are often used in conjunction with other cyber-attacks, and organizations that miss them do so at their peril.”

 

 

Read the article on InfoSecurity Magazine

 

 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.