Ransomware attacks may be the latest craze, but security professionals are more concerned about next year’s major threat- ransom-driven DDoS attacks.

Corero Network Security recently interviewed security practitioners at Infosecurity Europe to get a better understanding of what the community’s’ main concerns are for the next year.

The results overwhelmingly found that 80% of interviewees believe their organization will be faced with a DDoS ransom attack, and even worse, 43% feel their superiors will pay the ransom.

Interviewees also had some stark words for ISPs, with 59% of respondents worried their provider is not doing enough to protect their organization from DDoS attacks. The vast major of respondents also feels that net neutrality principals are possibly being used by ISPs to avoid accepting responsibility to offer adequate DDoS mitigation.

While telecom providers have traditionally directed traffic from one destination to another without passing judgment about the content, customers today want their telecom providers to deliver good, clean traffic, where the threats have been proactively removed.

Towards the end of April 2016, Action Fraud, the UK’s National Fraud & Cybercrime Report Center, claimed that numerous businesses had received extortion demands.

The article went on to say, “The group has sent emails demanding payment of 5 Bitcoins to be paid by a certain time and date. The email states that this demand will increase by 5 Bitcoins for each day that it goes unpaid. If their demand is not met, they have threatened to launch a Distributed Denial of Service (DDoS) attack against the businesses’ websites and networks, taking them offline until payment is made.”

NNT’s CTO Mark Kedgley advises a two-pronged approach to avoid falling victim to a ransom-driven DDoS attack- get layered defenses in place, and also back it up with real-time host intrusion detection through File Integrity Monitoring. With these defenses in place, if a cyber-attack proves successful, you’ll at least know about it in real time, instead of after the fact once serious damage has been done.



Read this article on InfoSecurity Magazine





The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.