DDoS Hackers for Hire

Joy Reo
By | December 06, 2016

Posted in: Network Security Trends , Enterprise DDoS Protection

Unfortunately, just in the past few weeks it’s become exponentially easier to launch a massive distributed denial of service (DDoS) attack. There are two reasons for this evolution:

1) in early October the Mirai source code for botnet-driven DDoS attacks was released on the Dark Web;

2) hackers have begun selling this Botnet-for-hire as a service. The cost of renting such services depends on how large the buyer wants the attack to be.

The Price of DDoS Revenge

According to Forbes magazine and several other news sources, the DDoS attack on Domain Name Service provider Dyn in late October was launched by a disgruntled gamer, as an act of revenge against Sony’s PlayStation Network. In the process of crippling PlayStation Network, the hacker took down Dyn and many of its marquis downstream customers, such as Air BnB, Twitter, Spotify and Netflix. Reportedly, the disgruntled gamer rented the service for $7,500. 

The original Mirai botnet code was capable of powering 100,000 bots. Now, just six weeks later, according to BleepingComputer there’s a new DDoS-for-hire service that’s powered by 400,000 bots. It used to be that hackers had to gain remote control of servers to launch attacks, but now that there are so many devices connected to the Internet of things (IoT), it’s easier to recruit an army of botnets.

The Best DDoS Defense

Individual enterprises alone cannot respond to this magnitude of DDoS threat. In light of the increasing frequency of such large DDoS attacks, Internet service providers and hosting providers need to offer DDoS defense at the network edge.

There are reports that this new botnet is capable of bypassing traditional DDoS mitigation solutions. That’s not surprising, because traditional DDoS solutions require time (usually 20-30 minutes) to swing traffic out to a DDoS scrubbing service. However, Corero’s DDoS prevention appliance  blocks even terabit-sized attacks, immediately and automatically, in real-time. In the end, it does not matter who launches a DDoS attack or why; it matters only that the attack is stopped automatically and immediately.

For more information, contact us.

You May Also Be Interested In: