Breaking News

Akamai Threat Advisory – Evolution of DDoS attacks

According to the US-based Akamai Technologies Distributed Denial Of Service (DDoS) attacks have a great level of sophistication today.

The Morris Worm of 1989 caused massive damage and losses with its unintentionally caused Denial Of Service (DoS) attacks. Fast forward to today, attacks have sharpened teeth targeting almost every IT service, from telco to gaming firms.

Distributed Denial Of Service attacks have a great level of sophistication today.

Consider for example the recent DDoS attack reported by the US-based Akamai Technologies against an European organization, a media that organization experienced a 363-GBps assault.

“On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denialof-Service (DDoS) attacks of the year on our routed network. The attack targeted a European media organization and was comprised of six attack vectors: syn, udp fragment, push, tcp, dns, and udp DDoS floods. It peaked at 363 Gigabits per second (Gbps) and 57 Million packets per second (Mpps).” Reads the Akamai Threat Advisory. “The attack analysis identified a dns reflection technique that abused a dnssec-configured domain. This attack technique generates an amplified response size due to the requirements of the Domain Name System Security Extension (dnssec).”

Everyone is so worried about Ransomware, Pokemon GO [which also faced Distributed Denial Of Service attacks recently] and Melania Trump’s copied speech. But we forgot that like many unwanted past memories , DDoS’ evolving nature will never make it a thing of the past but it shows a trend to a complex structure of massive future attacks.

Let’s break Distributed Denial Of Service attacks by its basic categories. HTTP flood,UDP flood,SYN flood,Ping Of Death (POD) , Slowloris,NTP Amplification , Zero Day DDoS attacks and the list goes on. The new kid on the block the DNS reflection, that adds to the huge torrent of data bombardment and is coming into use quite a bit.

The availability of a massive botnet in underground markets which maybe have large number of highjacked home routers . This lets malicious actors have DDoS service on lease to launch attacks.

“During the past few quarters, Akamai has observed and mitigated a large number of dns reflection and amplification DDoS attacks that abuse dnssec-configured domains. As with other dns reflection attacks, malicious actors continue to use open dns resolvers for their own purposes, effectively using these resolvers as a shared botnet. The attack techniques and duration of the attack point to the likelihood of booter services available for lease in the DDoS-for-hire underground marketplace.” Continues the advisory.

“From a technical perspective, the discovery and subsequent increasing employment of new attack vectors or botnets always represent significant, albeit grim milestones,” Akamai concluded.

DDoS campaigns are gaining a huge sophistication to them. I remember huge DDoS attacks being launched where refrigerators where involved. But with the coming of Smart Grid could the complexity , massiveness and  surging nature of such attacks become a morphed threat that only a few could handle ? Today only businesses and organisational datacentres are targets of such attacks . Tomorrow could such attacks could have a dire affect on us also, I mean some Pokemon GO maniac surely was angry that he couldn’t do a gym battle during the recent DDoS attack.

About the Author: Joshua Bahirvani

Cyber Security Enthusiast and believer of Privacy in this Digital Age.

LinkedIn : https://in.linkedin.com/in/jbahirvani15

Peerlyst: https://www.peerlyst.com/users/joshua-bahirvani

Twitter : @B15joshua

Medium : @jbahirvani15

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – DDoS, cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 46

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

12 hours ago

Security Affairs newsletter Round 525 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Securitythe weekly Security Affairs newsletterAffairs newsletter arrived! Every week…

13 hours ago

Operation ENDGAME disrupted global ransomware infrastructure

Operation ENDGAME dismantled key ransomware infrastructure, taking down 300 servers, 650 domains, and seizing €21.2M…

16 hours ago

Silent Ransom Group targeting law firms, the FBI warns

FBI warns Silent Ransom Group has targeted U.S. law firms for 2 years using callback…

1 day ago

Leader of Qakbot cybercrime network indicted in U.S. crackdown

The U.S. indicted Russian Rustam Gallyamov for leading the Qakbot botnet, which infected 700K+ devices…

2 days ago

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Law enforcement operation codenamed 'Operation RapTor' led to the arrest of 270 dark web vendors…

3 days ago