Archive: 2017

One Year after the Largest DDoS Attack

It’s been a full year since what most believe to be the world’s largest volumetric Distributed Denial of Service (DDoS) attack occurred.

Read more

DDoS Attacks on Sweden’s Transit System Signal a Significant Threat

Critical infrastructure organizations are at significant risk to the damaging impact of a Distributed Denial of Service (DDoS) attack.

Read more

Theft and DDoS Attacks Go Hand in Hand

Even if your organization has experienced a distributed denial of service (DDoS) attack only once, there’s still reason to feel uneasy.

Read more

DDoS Attacks Still on the Rise and Now Targeting Corporate Data

A new global survey by Kaspersky found that Distributed Denial of Service (DDoS) attacks have doubled over the last year.

Read more

Are Power Utilities Prepared for Cyber Attacks?

Accenture recently surveyed 100 utility executives from over 20 countries, and found that 57% of them are concerned that a cyber attack could interrupt the supply of electric power.

Read more

Survey Says More than One Third of US Businesses Experience DDoS Attacks

DDoS attacks cost not only time and money in the form of internal or external IT resources to bring a company’s network back online, but also create loss of revenue, brand reputation and customer trust.

Read more

Phantom RDoS Might Be a Fake Ploy, But Beware

A group that calls itself Phantom Squad has launched an email-based ransomware DDoS (RDoS) extortion campaign against thousands of companies across the globe in the past week.

Read more

“Everyday” DDoS Attacks Must Be Mitigated

At last week’s CLOUDSEC 2017 conference, Corero CEO Ashley Stephenson spoke to attendees about the importance of mitigating the “everyday” small-scale distributed denial of service (DDoS) attacks that are pervasive and harmful to global businesses.

Read more

DDoS Attacks on Internet Providers Can Impact Downstream Customers

Enterprises need to consider that even if they have protection against distributed denial of service (DDoS) attacks, their business could be taken offline if their Internet Service Provider (ISP), hosting provider or Domain Name Service (DNS) provider does not have adequate DDoS protection.

Read more

DDoS Attack Temporarily Folds Major Poker Game Site

Late last week America’s Cardroom’s Winning Poker Network (WPN), a major online gaming site, was hit with a ransom denial of service (RDoS) attack that lasted a few days.

Read more

Infected Google Play Store Apps Create Potential DDoS Botnet

This week the news broke that 300 apps from the Google Play Store were infected with malware that would allow Android phones to be recruited into a botnet.

Read more

The Rise of Ransom-Driven DDoS Attacks

In recent weeks, cyber attackers have become even more interested in extorting money from organizations by threatening to organize a DDoS attack on critically important online systems.

Read more

UK Considers Penalizing Operators of Essential Services for Lax Cyber Security

UK organizations that provide critical infrastructure could soon face penalties of up to £17m, or 4% of global turnover, if they suffer a loss of service due to having lax cyber security standards.

Read more

IT Professionals Forecast DDoS Attack Escalation

Corero recently surveyed some 100 IT security professionals at the InfoSecurity Europe conference in London last month, and their outlook on DDoS threat is bleak.

Read more

Federal Government Committee to Tackle the Botnet Problem

An advisory group for the U.S. federal government is taking on the challenge of preventing botnets, and reducing the number of botnets and their power.

Read more

Teen Hackers Can Launch a DDoS Attack for Cheap

You know it’s become way too easy to launch a distributed denial of service (DDoS) attack when even a 12-year old child can do it.

Read more

Final Fantasy 14 Plagued by DDoS Attacks

These attacks highlight just how exposed the gaming industry is to DDoS attacks, and reminds us how damaging successful attacks can be.

Read more

Cyber Insurance and DDoS Attack Protection

This past spring American International Group (AIG), one of the largest cyber insurance companies, surveyed cyber security and risk experts to gain a deeper understanding of their views of the likelihood and impact of a systemic cyber-attack.

Read more

Four Key Elements of Real-Time DDoS Defense

We have compiled a list of four elements of a DDoS defense system that will enable your business withstand a DDoS attack, in real-time.

Read more

Are DDoS Attacks on the Rise?

According to Corero’s recent DDoS Trends Report, Corero customers experienced an average of 124 attacks per month in the first quarter of this year (Q1 2017); that’s an increase of 9% compared to Q4 2016. In addition, 79 percent of DDoS attacks that Corero mitigated among its global customer base were less than 1Gbps in volume in Q1 2017. 98 percent of attacks were 10Gbps or less in volume.

Read more

Regulations May Decrease IoT Botnets, but Won’t Stop Them

The Internet of Things brings a host of advantages to consumers and businesses, but it also presents a slew of cyber security concerns.

Read more

Personal Data Security a Priority with New EU Regulations

Companies that have European constituents must prepare for the European Union General Data Protection Regulation that will go into effect in May 2018. The link between DDoS attacks and data theft should not be ignored.

Read more

DDoS Botnets, North Korea and the Threat of Cyber War

U.S. federal law enforcement and computer security agencies recently released a rare security alert, citing that a North Korean hacking group is actively targeting media, aerospace, financial, and critical infrastructure sectors in the United States and around the world. The hackers are believed to have used a botnet creation malware called DeltaCharlie to launch DDoS attacks.

Read more

Responding to DDoS Ransomware Demands & Attacks

Besides the financial loss that a company may experience by paying the ransom, companies must consider another risk: i.e., that they still will be subject to a DDoS attack by the hacker.

Read more

How to Handle DDoS Attacks: A Critique of DDoS Myths

A recent TechSpective article listed 20 ways to help prevent a DDoS attack. Some of the suggestions are helpful, but many of them have little benefit against the types of DDoS attacks which are common today. So, in the interest of busting some DDoS myths, this blog puts the recommendations in context.

Read more

Ponemon Report Weighs in on the Internet of Things

According to Dark Reading, a new Ponemon Institute report states that a majority of companies rely on legacy technologies such as network firewalls and intrusion prevention systems (IPS) to ward off cyber threats such as malware, ransomware and distributed denial of service (DDoS) attacks.

Read more

Benefits of Automatic DDoS Protection in a Hosting Environment

It’s relatively easy for hackers to launch distributed denial of service (DDoS) attacks against a web hosting provider, because they have such large attack surfaces.

Read more

Attack Detection: The Crucial First Step in DDoS Mitigation

If your IT security system fails to detect and block the majority of DDoS attacks, how can you be sure that your network is truly safe from other incursions?

Read more

The Future of DDoS Protection: Turning the Threat into a Revenue Generating Opportunity

Corero Network Security, in conjunction with Fierce Telecom has released "The Future of DDoS Protection: Turning the Threat into a Revenue Generating Opportunity". This executive summary highlights the unique needs of Service Providers, when deploying DDoS mitigation for infrastructure protection, as well as a new service offering for their customers.

Read more

Service Providers Can Offer Per-Customer DDoS Attack Dashboards

Distinguishing between “good” traffic and “bad” network traffic has not always been easy, and it has been traditionally difficult to present in visual terms. But when IT security staff can see network intrusions in real-time, they can better defend against them.

Read more

WannaCry Ransomware Attack Wreaks Havoc Across Globe

May 12, 2017 now marks an unwelcome milestone in hacking history; the largest-ever ransomware attack occurred that day, affecting thousands of private and public sector agencies across 150 countries.

Read more

DDoS Attack Briefly Cripples the FCC Comment System

It’s hardly surprising that DDoS attacks finally caught the attention of politicians; it was just a matter of time until a DDoS attack affected a government agency. A combination of events has led to more awareness of cyber threats, including DDoS attacks.

Read more

5 Essential Qualities to Look for in a DDoS Mitigation Solution

When vetting various distributed denial of service (DDoS) mitigation services, enterprises would be wise to determine which kind of protection their business needs, and look for five key characteristics.

Read more

DDoS Attacks: The Changing Legal and Regulatory Landscape

Internet service providers are increasingly treated more like public utilities than consumer services; will government regulations require that they block DDoS traffic? That remains to be seen. Ultimately the demands of enterprises and consumers may have more influence than any government regulations. The business landscape may require ISPs to provide DDoS protection, if only to protect themselves from litigation.

Read more

The Threat of North Korea’s DDoS-driven Cyber Attack

DDoS attacks can cripple crucial Internet systems. Learn about the potential damage a cyber attack wielded by North Korea could do.

Read more

What ISPs Need To Know About CLDAP DDoS Attack Vectors

The Corero Security Operations team has identified significant exploitation of the CLDAP attack vector in attack attempts against its customers since it was first disclosed in October 2016.

Read more

DDoS-For-Hire Services Under the Spotlight

The rise of DDoS-for-hire botnets has caused an explosion of attacks, partly due to their cheap price point – they can be launched for just a few dozen dollars per month.

Read more

DDoS Attacks and Political Hacks

The British House of Commons issued a report last week, indicating the possibility that hackers from Russia or China launched a DDoS attack that crashed the United Kingdom's voter registration website before the deadline to register for the historic Brexit vote. Was that the likely cause of the crash, and could something similar happen in the US?

Read more

Why Real-Time DDoS Mitigation Is Essential for Your Network Security

If you think your network is safe from distributed denial of service (DDoS) attacks just because your website or web application has not been taken offline, think again. The cyber threat landscape continues to evolve dramatically. In terms of DDoS attack trends, two things have happened.

Read more

Survey Says Businesses Want DDoS Protection from ISPs

Corero conducted a survey of decision makers and security experts, to get a pulse on industry concerns about DDoS attacks in 2017. Learn about the results!

Read more

Myths that Surround Cloud-based DDoS Mitigation

Now that DDoS attacks are a common occurrence for many companies, more organizations are rightfully worried about protecting their servers and web applications. With that wave of concern comes a slew of advice—some good, some bad—from IT experts about the best anti-DDoS approaches. One example of bad advice is to suggest that organizations can rely exclusively on cloud-based mitigation.

Read more

How Can a DDoS Attack Be Part of a Security Breach?

A recent study by BitDefender showed that 34 percent of companies in the U.S. were breached in the past year, and 74 percent of the victims don’t know how it happened. Companies must realize that DDoS attacks are often part of the toolkit for cyber criminals to launch a security breach.

Read more

Is DDoS Protection Worth the Investment?

Anti-DDoS technology has often been difficult or costly for individual organizations to deploy. Fortunately, DDoS defense solutions have evolved, enabling hosting providers and ISPs to offer affordable DDoS protection to their customers.

Read more

Lack of IoT Security Fuels Terabit DDoS Attacks

Learn why unsecured IoT devices have become the backbone source for current and future multi-terabit distributed denial of service (DDoS) attacks.

Read more

DDoS Attacks, Who Dunnit? The Fight for Improved Detection and Protection

A recent Kaspersky Lab study found that many businesses that have suffered DDoS attacks believe that their competitors launched the attacks. Is there evidence to support their beliefs?

Read more

Mirai IoT Malware Now Infecting Windows Systems

The Windows-based spreader appears to have been created by a developer with advanced skills, and has a richer and more sophisticated code and components than the original Mirai malware. 

Read more

What is the Benefit of Real-Time DDoS Mitigation? Let a Corero Customer Tell You!

The following post is contributed by our friends at Zare, a UK based hosting provider for quality, affordable and DDoS protected dedicated hosting solutions.

Read more

The Importance of DDoS Attack Visibility

As sophisticated DDoS threats continue to evolve, effective security analysis requires continuous visibility into the traffic flowing between the protected network and the Internet. Analysis of past events is valuable to help prepare for future threats.

Read more

Nearly 40% of Companies Lack Skills and Technology to Handle DDoS Attacks

A recent TripWire study highlights the growing problem of cyberattacks, and whether IT staff feel that their companies have the right combination of skills and technology to cope with various types of cyber threats.

Read more

If You Haven’t Already Been DDoS’ed, Assume You Will Be

Some companies are keenly aware of attacks on their networks, but other companies are not. Even in some companies that have dedicated IT security staff and systems in place, major security breaches have occurred. It can take months or even years for an organization to realize that it has been breached.

Read more

IoT-Driven Botnet Attacks US University

To avoid experiencing similar incidents, companies need to pay close attention to the network settings for their IoT devices and, where possible, separate them from access to the Internet and to other devices.

Read more

Financial Impact of Mirai DDoS Attack on Dyn Revealed in New Data

Several months after the now-infamous DDoS attack on DNS provider Dyn last October, the incident continues to make headlines. Earlier this month, reports emerged about the scale of customer losses that the company experienced in the wake of the attack. According to security ratings provider, BitSight, roughly 8% of Dyn’s customer base stopped using their services in the aftermath of the attack.

Read more

DDoS Attacks Won't Be Blocked by Black Holing/Null Routing

Anti-DDoS solutions have evolved dramatically over the past few years, so it’s surprising to see occasional articles that still recommend outdated approaches, such as remote black holing (also called null routing) to stop unwanted traffic.

Read more

An Economical Approach to DDoS Attack Protection for Hosting & Service Tenants

Corero's new product, the SmartWall® Service Portal, enables Internet Service providers and hosting providers to offer DDoS Protection as-a-Service (DDPaaS) to their tenants in a flexible and economic model. A few years ago, such DDoS technology was not available; now, it’s the wave of the future.

Read more

Increased Risks of DDoS Attacks for Ransom to Businesses

DDoS extortion campaigns are a common tool in the cyber-threat arsenal, and one of the easiest ways for an attacker to turn a quick profit. When service availability is threatened, the victim company needs to consider the potential loss in downtime, revenues and brand damage.

Read more

Untangling the Dark Web behind Mirai IOT Botnet DDoS Attacks

Security researcher Brian Krebs believes he has unraveled the mystery of who launched a massive Mirai botnet DDoS attack on his site in September of 2016. If Krebs’ allegation is true, then this is a seamy tale of a good programmer who went bad: a white hat turned into a black hat.

Read more

How DDoS Attacks Impact Hosting Providers [Part 2] – Data Security

On its own, a DDoS attack is not a security breach; however, it can pose a serious data security risk for hosting providers and others. Learn why IT security teams cannot afford to ignore DDoS threats, no matter how small the attacks may be.

Read more

How DDoS Attacks Impact Hosting Providers [Part 1] – Web Availability

Most hosting providers experience DDoS attacks on a nearly daily basis, even if they are typically not volumetric attacks that drag down an entire network. When a hosting provider gets hit with a volumetric attack, the ramifications can be far-reaching and long-lasting.

Read more

Law Enforcement Tries to Curb DDoS Attacks

Law enforcement is at a disadvantage against hackers, mostly because distributed denial of service (DDoS) attacks leave little or no trace of evidence. However, police have made some arrests recently, which counts as a tiny bit of progress in the uphill battle against cyber criminals.

Read more