Skip to main content

Posts

Showing posts from March, 2020

DDoS Attacks on the Rise

Europol's "Internet Organised Crime Threat Assessment 2019" report outlines how DDoS attacks are among the biggest threats reported in the business world. The favorite DDoS targets of criminals in 2019 were banks and other financial institutions, along with public organizations such as police departments and local governments. Travel agents, Internet infrastructure, and online gaming services were also in the cybercriminals' crosshairs. Some arrests were made, but they had no noticeable impact on the growth rate of DDoS attacks or on the Dark Web infrastructure that makes them possible, according to Europol. how do you ddos ? While many DDoS attacks go unreported and unnoticed, some are making the news. In October, a major DDoS attack roughly eight hours long struck Amazon Web Services (AWS), making it impossible for users to connect because AWS miscategorized their legitimate customer queries as malicious. Google Cloud Platform experienced a range of problems at

DDOS Attacks in 2020

When a malicious user wants to disrupt web services, they often use a distributed denial of service (DDoS) attack. You’ve probably heard the phrase countless times in the media. The basic idea is always the same: send so much junk to a server that legitimate traffic cannot get through. DDoS has been used against root domain servers in a bid to shut down the entire world wide web. Despite being as old as the internet itself, DDOS is still one of the most effective tools malicious users have at their disposal. But what does a DDoS attack actually involve? We first have to understand both denial of service and distributed denial of service. What is a DDoS Attack ? The difference between DOS and DDOS is in the origin of the attack. A denial of service (DOS) attack comes from a single person or network. A distributed denial of service attack (DDOS) will involve computers from networks all over the world. (Distributing the attack amplifies it, and it also makes it more diffic

Lift the DDoS Smokescreen: Investigate Underlying Attacks

The sophistication of cybercriminals and the attraction of the “Black Hat” cyberspace have grown dramatically over the years. In the past, cyber assaults were carried out mostly by amateurs, motivated by boredom or plain curiosity. Nowadays, such activities might be the work of successful business ventures, holding big financial stake in their success. With increasing professionalism, the attack tactics continue to evolve, giving rise to new multi-team and multi-vector attacks. The decoy Large scale DDoS attacks slow down a company’s day-to-day operations, sometimes bringing them to a complete halt. During such an attack the whole IT team, often already thinly spread, can become completely engaged in restoring the infrastructure functionality, leaving other areas unattended. Denial of service attack definition However, a DDoS might be aimed at more than just disrupting service. In recent years we’ve witnessed cases where large service disruptions came in parallel with other at

DDoS Infrastructure Improvements

First, consider increasing bandwidth and server performance.  DDoS attacks attempt to overwhelm available resources so additional resources will allow you to withstand greater attacks.  This involves having more server space or bandwidth than necessary.  Such over-provisioning addresses the number one problem brought on by a DDoS attack, link and equipment saturation.  Unfortunately, it can be difficult to determine how much extra hardware and bandwidth is necessary to sustain an attack as even some of the largest companies have succumbed to DDoS attacks.  When attacks fail, attackers often gather a larger bot army and try again. Traffic Filtering Consider configuring your firewall or IDS (Intrusion Detection System) to filter DDoS traffic, if the functionality is available, or consider upgrading to a system that does.  DDoS traffic filtering devices prevent SYN, TCP Flooding and other types of DDoS attacks.  Such devices typically analyze TCP flow control, conduct packet filterin

OKEx & Bitfinex Experience DDoS Attacks

OKEx and Bitfinex have suffered DDoS attacks in a short time frame. Distributed denial-of-service (DDoS) attacks are malicious attempts at disrupting normal traffic of targeted service and a major concern in internet security today. While being more effective at defending themselves and resolving the issues caused by DDoS attacks, tech giants are no exception and still face these threats. how does a ddos attack work ? OKEx, a top of the line cryptocurrency exchange and advanced financial service provider, made an announcement on Weibo, stating that they had been targeted for a DDoS attack last night. However, their support team was able to detect the attacks early on and resolve the issues rather quickly, assuring that no clients had been affected by the attack. While the exact source of the attack is unknown, OKEx believes it to be an attack orchestrated by a competitor. Jay Hao, CEO of OKEx, commented on the subject by saying that the products and technologies of their com