ISP DDoS Protection Posts

Bursts, Waves and DDoS: What You Need to Know

A recent Cisco report found that 42 percent of organizations experienced “burst” distributed denial of service (DDoS) attacks in 2017.

Read more

Minding Your MANRS

Maintaining the resilience and stability of the global Internet requires collaborative efforts between Internet Service Providers (ISPs), government agencies, enterprises, security vendors and end users.

Read more

ISPs Can Help Their Customers Defend Against DDoS Attacks

Every organization has IT security vulnerabilities, and many need to be especially concerned about distributed denial of service (DDoS) attacks.

Read more

DDoS Attacks on Internet Providers Can Impact Downstream Customers

Enterprises need to consider that even if they have protection against distributed denial of service (DDoS) attacks, their business could be taken offline if their Internet Service Provider (ISP), hosting provider or Domain Name Service (DNS) provider does not have adequate DDoS protection.

Read more

Attack Detection: The Crucial First Step in DDoS Mitigation

If your IT security system fails to detect and block the majority of DDoS attacks, how can you be sure that your network is truly safe from other incursions?

Read more

The Future of DDoS Protection: Turning the Threat into a Revenue Generating Opportunity

Corero Network Security, in conjunction with Fierce Telecom has released "The Future of DDoS Protection: Turning the Threat into a Revenue Generating Opportunity". This executive summary highlights the unique needs of Service Providers, when deploying DDoS mitigation for infrastructure protection, as well as a new service offering for their customers.

Read more

Service Providers Can Offer Per-Customer DDoS Attack Dashboards

Distinguishing between “good” traffic and “bad” network traffic has not always been easy, and it has been traditionally difficult to present in visual terms. But when IT security staff can see network intrusions in real-time, they can better defend against them.

Read more

DDoS Attacks: The Changing Legal and Regulatory Landscape

Internet service providers are increasingly treated more like public utilities than consumer services; will government regulations require that they block DDoS traffic? That remains to be seen. Ultimately the demands of enterprises and consumers may have more influence than any government regulations. The business landscape may require ISPs to provide DDoS protection, if only to protect themselves from litigation.

Read more

DDoS-For-Hire Services Under the Spotlight

The rise of DDoS-for-hire botnets has caused an explosion of attacks, partly due to their cheap price point – they can be launched for just a few dozen dollars per month.

Read more

Why Real-Time DDoS Mitigation Is Essential for Your Network Security

If you think your network is safe from distributed denial of service (DDoS) attacks just because your website or web application has not been taken offline, think again. The cyber threat landscape continues to evolve dramatically. In terms of DDoS attack trends, two things have happened.

Read more

Survey Says Businesses Want DDoS Protection from ISPs

Corero conducted a survey of decision makers and security experts, to get a pulse on industry concerns about DDoS attacks in 2017. Learn about the results!

Read more

Mirai IoT Malware Now Infecting Windows Systems

The Windows-based spreader appears to have been created by a developer with advanced skills, and has a richer and more sophisticated code and components than the original Mirai malware. 

Read more

Nearly 40% of Companies Lack Skills and Technology to Handle DDoS Attacks

A recent TripWire study highlights the growing problem of cyberattacks, and whether IT staff feel that their companies have the right combination of skills and technology to cope with various types of cyber threats.

Read more

Financial Impact of Mirai DDoS Attack on Dyn Revealed in New Data

Several months after the now-infamous DDoS attack on DNS provider Dyn last October, the incident continues to make headlines. Earlier this month, reports emerged about the scale of customer losses that the company experienced in the wake of the attack. According to security ratings provider, BitSight, roughly 8% of Dyn’s customer base stopped using their services in the aftermath of the attack.

Read more

An Economical Approach to DDoS Attack Protection for Hosting & Service Tenants

Corero's new product, the SmartWall® Service Portal, enables Internet Service providers and hosting providers to offer DDoS Protection as-a-Service (DDPaaS) to their tenants in a flexible and economic model. A few years ago, such DDoS technology was not available; now, it’s the wave of the future.

Read more

Increased Risks of DDoS Attacks for Ransom to Businesses

DDoS extortion campaigns are a common tool in the cyber-threat arsenal, and one of the easiest ways for an attacker to turn a quick profit. When service availability is threatened, the victim company needs to consider the potential loss in downtime, revenues and brand damage.

Read more

Law Enforcement Tries to Curb DDoS Attacks

Law enforcement is at a disadvantage against hackers, mostly because distributed denial of service (DDoS) attacks leave little or no trace of evidence. However, police have made some arrests recently, which counts as a tiny bit of progress in the uphill battle against cyber criminals.

Read more

Could Volumetric DDoS Attacks Shut Down the Internet?

Many people are now asking the question, were the 2016 DDoS attacks just warm-up drills or test runs for even larger attacks that would cripple large parts of the Internet? The potential certainly exists; is it probable?

Read more

5 Cyber Security Questions to Ask an Internet Service Provider

Business depends upon Internet reliability and security, so when it comes to choosing your Internet Service Provider (ISP), it pays to ask the right questions. Given the prevalence of DDoS attacks, one can no longer assume that that your Internet service will be 1) always reliable or 2) “clean.”  

Read more

DDoS Attack Predictions for 2017

What challenges and changes will 2017 bring to the DDoS threat landscape? And why is there reason to be optimistic that the number of volumetric DDoS attacks will decrease in the next few years? Read our predictions for 2017.

Read more

DDoS Attacks on Critical Infrastructure

Could a DDoS attack cause a long-term disruption of industrial control systems, which operate or monitor much of the nation’s critical infrastructure?

Read more

How to Handle Terabit-Scale DDoS Attacks

In the wake of so many DDoS attacks in recent months/years, many enterprises and agencies are seeking ways to protect themselves from such attacks, and the burden of stopping DDoS attacks should fall mostly on Internet Service Providers and Hosting Providers.

Read more

BlackNurse DoS Attack – What You Should Know

Researchers have warned that a low-volume BlackNurse DoS attack can easily take down certain firewalls.

Read more

ISPs Can Stop DDoS Attacks, Without Violating Net Neutrality Laws

In reference to the massive DDoS attack on Dyn, some telecommunications industry experts recently gathered to discuss the issue of “Net Neutrality,” an important and sensitive issue for Internet Service Providers.

Read more

Can DDoS Attacks Be Prevented by Policies or Legislation?

To avoid future DDoS attacks, several U.S. lawmakers have called on the government to improve cyber security protections and consider new rules for web traffic. Would such laws or policies help?

Read more

DDoS Attacks, Security Breaches Validate the Need for National Cyber Security Awareness

It’s very apropos that October is National Cyber Security Awareness Month because this month and the preceding month have been chock full of record-breaking cyber attacks.

Read more

The Impact of Recent DDoS Attacks Against DNS Infrastructure

Websites across the East Coast were impacted as a result of a reported DDoS attack against a well-known DNS provider’s Infrastructure.  The online availability of popular brands such as Twitter, Spotify, Basecamp, Netflix and a laundry list of others were impacted.

Read more

DDoS Attacks: How Service Providers Can Protect the Media

In the run-up to the US election, we can expect to see more and more of the types of DDoS attack that took Newsweek offline last week. However, these attacks can easily be defeated by service providers, at the network edge.

Read more

Bad News: Bots Thrive on the IoT

The explosion of IoT devices and the release of the "Mirai" code enables more botnet-driven DDoS attacks. However, telecoms can help reduce such attacks.

Read more

Sub-Saturating DDoS Attacks Steal Bandwidth

Sub-saturating, surgical DDoS attacks can be a threat to any organization, but the impact on Service Providers can be even greater.

Read more

911 Systems at Risk for TDoS Attack Takedown

Researchers from Ben Gurion University in Israel recently discovered that cyber criminals could launch a telephony denial-of-service (TDoS) attack that could take over thousands of smartphones to form a zombie army of botnets that would automatically dial repeated calls to a 911 system.

Read more

Study: 78% of Businesses Not Prepared for Security Breaches

A new study published by international consulting firm KPMG and telecoms group BT recommends that businesses collaborate with telecom companies, Internet Service Providers, banks, credit-card providers, insurers and the security industry in a concerted effort to improve cyber security.

Read more

Online Gaming Companies are EA-sy Targets for DDoS Hackers

Recent DDoS attacks on Blizzard and EA servers highlight the vulnerability of the online gaming industry. Fortunately, gaming companies— or, for that matter, all companies that rely on a continuous online presence— now have better choices that can deliver near-instantaneous protection.

Read more

Why is the UK a Prime Target for DDoS Attacks?

Reports surfaced last week that the UK has now become the world’s second most targeted nation for DDoS attacks, following a 220% rise in the number of attacks globally in the last year.

Read more

Customers Want “Clean Pipe”

If your water utility delivered contaminated water into your home, you’d probably complain; of course consumers expect clean, potable water from their water utilities. Likewise, enterprise customers have begun to realize that “dirty” Internet traffic threatens their availability, security and bottom line, so they increasingly demand “clean pipe” from their Internet Service Providers (ISPs).

Read more

Need for ISP DDoS Protection Demonstrated in Mumbai Attack

A DDoS attack on an Internet Service Provider (ISP) earlier this week crippled Internet service throughout Mumbai, India, which clearly demonstrated why it’s so important for ISPs to have DDoS protection.

Read more

IT Security Professionals Want Better DDoS Protection from Service Providers

Corero polled over 100 IT security professionals at the Infosecurity Europe 2016 conference in London last month, and the survey shows that UK businesses are not only worried about DDoS attacks, they want better protection from their Internet Service Providers.

Read more

Meet Corero’s Family of DDoS Mitigation Hardware

If you’re doing research about DDoS protection solutions there are many choices out there, and it can be challenging to find the solution that best fits your organization. Learn about the pros and cons of scrubbing service vs. cloud-based mitigation vs. DDoS mitigation appliances.

Read more

DDoS Protection Increases Customer Retention for Telecoms

Retaining and growing accounts for existing customers is much easier than gaining new ones, particularly in the telecommunications industry, which has significant turnover. But which technologies offer the greatest opportunities for this kind of advancement?

Read more

A DDoS Mitigation Appliance Blocks Attacks

In a recent survey, 30% of respondents said their enterprise relies on traditional security infrastructure products (firewall, IPS, load balancers) to protect their businesses from DDoS attacks. Unfortunately, those companies are still very vulnerable to DDoS attacks.

Read more

Cyber Security & DDoS Protection: Major Themes at Big Communications Event

At last week's Big Communications Event, the annual gathering of experts in the telecoms and communications industry, one major topic was how to secure the provider network and protect downstream customers from cyber threats.

Read more

Automated DDoS Protection Reduces Costs & Prevents Downtime

Human intervention is insufficient for most cyber security attacks because humans can’t immediately see every attack, and they certainly can’t respond fast enough (in real time) to block all infiltrations.

Read more

All Gigs Are Not Created Equal: DDoS Protection Makes a Difference for ISPs

When evaluating an Internet Service Provider, it’s important to consider the quality, as well as quantity, of bandwidth it offers. How effectively a provider protects its customers from Distributed Denial of Service (DDoS) attacks can have a dramatic impact on the quality of Internet service.

Read more

Benefits of Real-Time DDoS Protection

If your organization is debating the merits of a DDoS protection appliance compared to a DDoS scrubbing service, this blog post offers a short explanation of the key differences between these types of DDoS solutions.

Read more

Key Components of Our DDoS Monitoring Tool for Virtual Machines

Corero’s latest product, the SmartWall® Threat Defense - Virtual Edition (vNTD Monitor), allows service providers who are looking to scale out their security analytics environment to simply “drop” security visibility into any part of their network to analyze the nature of a threat.

Read more

Protect Your Network from Cyber Extortion with a DDoS Protection Solution

This week ushered in several news articles about recent DDoS extortions that turned out to be scams conducted by some hackers who pretended to be part of the Armada Collective. Some businesses paid the ransom fee, but they could have avoided the entire problem if they had adequate DDoS protection in place.

Read more

Majority of Enterprise Customers Want Better DDoS Protection from ISPs

FierceMarkets and Corero jointly published a new research report based on a survey of ISPs and enterprise customers regarding DDoS mitigation strategies. The report discusses not only the traditional methods of DDoS mitigation, but also the rationale of some ISPs who have not yet adopted more effective anti-DDoS technology.

Read more

DDoS Hackers Using IoT Devices to Launch Attacks

There are millions of connected devices that comprise the Internet of Things (IoT), which leads to many security weaknesses that DDoS hackers can leverage. By using amplification techniques on the millions of very high bandwidth density devices currently accessible, such as baby video monitors and security cameras, DDoS attacks are set to become even more colossal in scale.

Read more

DDoS Mitigation as a Service Offering for Telecoms

For today’s internet-driven businesses, any service degradation or outage can have a detrimental impact on brand, customer loyalty and the bottom line. Increasingly, such incidents are being caused by Distributed Denial of Service (DDoS) attacks, and this is one area where telecoms can take leadership.

Read more

Corero Receives “Recommended” Rating in NSS DDoS Prevention Solutions Security Value Map

Corero SmartWall® Threat Defense System (TDS) earned a top position in the latest NSS Labs DDoS Prevention Group Test, earning the coveted “Recommended” rating, with high performance in all test categories.

Read more

Survey: DDoS Attacks Cause Loss of Customer Trust & Decreased Revenues

We've released the results of our annual DDoS Impact Survey, which polled technology decision makers, network operators and security experts about key DDoS issues and trends that Internet service providers and businesses face in 2016. Nearly half (45%) of the survey participants indicated that loss of customer trust is the most damaging consequence of DDoS attacks to businesses. See our infographic that sums up rest of the survey results!

Read more

The Dangers of Short-Duration, Sub-Saturating DDoS Attacks

Many organizations aren’t even aware of when their sites are experiencing a DDoS attack, because the majority of attacks are under 1 Gbps, and are perceived as only annoying “noise” in the IT background; the attacks are not large enough to get the attention of IT security staff. That doesn’t mean they should be ignored, however. Unseen, low-level DDoS attacks cause two problems.

Read more

DDoS Mitigation Service Provider, Staminus Suffers a Major Security Breach

Staminus, a global hosting and Web security firm, suffered a major blow late last week when it became the victim of a security breach. Staminus is a hosting provider and provider of cloud-based DDoS mitigation services.

Read more

How Corero Protects Against Blended DDoS Attacks

DDoS attacks come in various forms, and hackers have become more sophisticated by launching blended attacks that combine three, four or five types of attacks at the same time. Fortunately, the Corero SmartWall Threat Defense System (TDS) defends against all of them. A recent 75Gbps combined ACK and SYN flood attack on a Corero customer illustrates this point.

Read more

A Telecom Case Study: Deployment of DDoS Mitigation Solution

In a recent webinar hosted by IHS on “Service Provider Deployment of DDoS Mitigation,” Stephen Clark, Director of IP Networks at Telesystem, explained that Block Communications implemented the Corero SmartWall® Threat Defense System on each of its vital interconnects to Tier 1 providers. The solution is in-line deployment of automatic DDoS mitigation that stops malicious traffic at the peering edge. “We can protect our networks at the gate, in real-time,” said Clark.

Read more

Introducing the Corero Virtual Edition (vNTD) Monitor – a DDoS Detection Engine

Last week we announced a new product: vNTD Monitor, which provides the freedom and flexibility to monitor DDoS activity in real-time against any server, application or network. This industry-leading technology provides visibility of attack traffic, intuitive analytics and alerting of DDoS attack vectors targeting a system or workload.

Read more

A Security Guide for Next Generation Service Provider Network Architecture

In the typical service provider network today, security is often an afterthought; after building the network, engineers typically add encryption and firewalls, neither of which is sufficient to protect against the increasing malware and DDoS attacks that plague networks and service functions.

Read more

Clear and Comprehensive Visibility into DDoS Attack Mitigation

Whether they are online enterprises, hosting providers or Internet service providers, companies need 24/7 insight into their network security, particularly regarding DDoS attacks and other cyber threats that target their Internet-facing services.

Read more

Distributed Denial of Service Attacks Caused 22% of Unplanned Data Center Outages in 2015

The “2016 Cost of Data Center Outages Report,” published recently by Emerson Network Power in conjunction with the Ponemon Institute, states that unplanned data center outages cost companies nearly $9,000 per minute, and the second most common cause of outages was cybercrime, specifically Distributed Denial of Service (DDoS) attacks.

Read more

In-Line, Always-On DDoS Protection Makes Sense for Service Providers

It's not practical or cost effective to handle DDoS attacks with a swing to a cloud scrubbing service; they must be mitigated locally to maintain availability, performance and latency.

Read more

Going After the People Behind DDoS Attacks

There are two aspects of fighting DDoS attacks. One is remediation—stopping the attack when it comes in. Corero and other providers have this part of the equation covered. The other aspect of stopping attacks has to do with law enforcement, which can be done only with the help and support of the victim companies.

Read more

DDoS Attacks Rise in Size, Sophistication and Frequency

Distributed denial of service (DDoS) attacks are clearly on the rise: growing in size, sophistication and frequency. Any type of website can be preyed upon by a DDoS attacker, and several high-profile websites have been hit in recent weeks, ranging from corporate enterprises and government agencies to educational institutions. In this blog post Corero COO Dave Larson answers questions about these troubling trends.

Read more

Mitigating Multi-Vector DDoS Attacks

Corero's Security Operations Center* team monitors various customer websites 24/7, 365 days per year. They regularly see DDoS attacks in real-time, many of which are so small that they would be unnoticed by the customer if not for the Corero SmartWall® Threat Defense System (TDS). However, they also see very large, multi-vector attacks in progress. This blog includes sample reports of high-volume, multi-vector attacks detected and mitigated in real-time by the SmartWall® Threat Defense System.

Read more

DDoS Mitigation Solutions Have Evolved from Cost Item to Revenue Opportunity

Now that DDoS mitigation solutions are more affordable and scalable, there is opportunity to not only save on operational and bandwidth costs, but also to generate new revenue. Service providers can turn mitigation structure around to re-sell it as a service to their customers downstream.

Read more

On the Upswing: Cyber Insurance to Cover the Liability of DDoS Attacks

Cyber insurance is not a substitute for making smart investments in cyber security and following industry best practices. However, it is an important part of almost any business's risk mitigation strategy.

Read more

What Motivates DDoS Attackers?

Whether motivated by greed, cheap thrills or politics, DDoS hackers wreak havoc on websites. The best protection is prevention: defensive solutions that can detect and stop DDoS hackers in their tracks before they do any damage.

Read more

This new hacktivism tactic makes every organization with a web presence a potential target for a DDoS attack

Hacktivism is on the rise as a motivation behind numerous DDoS attacks. For whatever reason, groups like Anonymous, Lizard Squad, Syrian Electronic Army, Chaos Computer Club and others believe they can intimidate corporations, government agencies, and other institutions by knocking these entities' websites offline for a period of time. One of the latest victims of a hacktivist attack is the Japanese carmaker Nissan.

Read more

Someone is trying to break the Internet, and it isn't Kim Kardashian

Break the Internet? Kim Kardashian's Paper Magazine cover couldn't do it, but now someone is trying to bring it down for real using DDoS attacks on the Internet Domain Name System's root name servers. Root Server Operators (RootOps) reports that on at least two separate occasions, several of the root name servers were hit with an...

Read more

DDoS Lessons Learned, and Staying Ahead of These Threats in 2016

The DDoS attack landscape of 2015 has brought a consistent spattering of headlines that further highlight the severity of this type of cyber-attack.

Read more

Carrier Grade NAT and the DoS Consequences

The Internet has a very long history of utilizing mechanisms that may breathe new life into older technologies, stretching it out so that newer technologies may be delayed or obviated altogether. IPv4 addressing, and the well-known depletion associated with it, is one such area that has seen a plethora of mechanisms employed in order to give it...

Read more

Here they come – DDoS attacks via the Internet of Things

Experts have long warned that the inherent lack of security in many of the devices that make up the Internet of Things (IoT) would come back to harm us in the end. Now there is firm evidence that hackers are exploiting weak and default credentials on embedded devices to create botnets that are the sources of DDoS attacks. Closed-circuit...

Read more

ProtonMail Gives in to DDoS Ransom

Last month I published a post in reference to the surge in ransom driven DDoS attacks against Corero’s customers. “Over the last thirty days, roughly 10% of Corero’s customer base has been faced with extortion attempts, threatening to take down their websites and services unless they pay out various Bitcoin ransoms. Through...

Read more

Is DDoS Mitigation as-a-service becoming a defacto offering for providers?

It’s well known in the industry that DDoS attacks are becoming more frequent and increasingly debilitating, turning DDoS mitigation into a mission critical initiative for providers. From the largest of carriers to small and mid-level enterprises, more and more Internet connected businesses are becoming a target of DDoS attacks. What was once...

Read more

Vigilante DDoS attacker goes after offensive websites

It's almost easy to empathize with someone who feels justified in using DDoS tactics to temporarily take down websites that belong to the Islamic State, pedophiles, and racist and homophobic hate groups. Then we have to remind ourselves that, no matter how offensive or repugnant the content of these websites is, it's still considered to be...

Read more

Corero Observes Surge in Ransom Driven DDoS Attacks

The Corero Security Operations Center has seen an increase in cyber-extortionists targeting web hosting providers with Bitcoin ransom demands. Over the last thirty days, roughly 10% of Corero’s customer base has been faced with extortion attempts, threatening to take down their websites and services unless they pay out various Bitcoin...

Read more

DDoS Impact on Mobile Networks – Radio Congestion

Most CSP’s and Mobile Carriers have deployed some form of DDoS scrubbing complex in their network to clean large, long duration DDoS attacks. While this is a necessary first step in proactively working to defeat the DDoS challenge, the threat landscape is constantly changing and requires a more modern approach to protection. Based on...

Read more

Groups like DD4BC are just the beginning!

The group calling themselves “DDoS for Bitcoin” (DD4BC) continues to extort money from a host of companies located all over the globe, and today very few organizations are able to adequately protect themselves from DD4BC’s tactics. The group’s extortion campaigns have been increasing recently which include a preemptive...

Read more

DDoS Defense Initiatives – It looks like everyone is getting involved!

Over the past few weeks news feeds all over the world have been pulsating about the recent DARPA announcement.  On August 14th, 2015 the U.S. Defense Advanced Research Projects Agency (DARPA) announced an initiative called Extreme DDoS Defense (XD3).  Interestingly enough, DARPA is not the only U.S. government agency calling for research...

Read more

Lizard Squad retaliates against the UK's National Crime Agency following arrests of "customers"

Lizard Squad just can't leave it alone. Last week we reported that the National Crime Agency (NCA) in the United Kingdom arrested a number of teenagers who used Lizard Squad's DDoS tool Lizard Stresser. (See Users of DDoS-as-a-Service are arrested in the UK.) Just days after those arrests, the NCA's website was attacked and...

Read more

Upping Their Game - Three New DDoS Attack Methods already in 2015

The stakes have been raised even higher as organizations prepare for three new methods of DDoS attacks that have emerged in the last six months alone. The reflective/amplified category of DDoS attack has been around for nearly four years, but once again attackers are finding new methods of launching their assaults within this attack...

Read more

Optimizing Carrier DDoS Mitigation Scenarios - Part 2- Peering Point Deployment

In an in-line peering point DDoS protection deployment scenario, SmartWall ® Network Threat Defense Appliances (NTD) are deployed on each of the Service Providers’ peering points to their upstream Internet bandwidth providers.  This ensures always-on DDoS attack mitigation services while benefitting from the highest levels of...

Read more

DDoS extortion campaigns on the rise

Just recently the Internet Complaint Center (IC3) issued an alert to businesses regarding a rise in extortion campaigns, tied to threats of DDoS attack activity unless a ransom is paid. The rise in DDoS attacks generally, is not surprising at all and the use of the “DDoS threat” for ransom or extortion is not a new tactic in...

Read more

This week in DDoS attacks – Protest and Activism

Ideological motivations for DDoS attacks can impact anyone at any time. This week, two high profile organizations Planned Parenthood and New York Magazine were severely impacted by ideological hacktivists taking down their websites with DDoS attacks.

Read more

The DDoS Opportunity Awaits

In the late 1990’s a large number of DSL providers were raising millions of dollars in venture capital to build their DSL networks in the United States. in order to offer broadband Internet access to local consumers. Many subscribers were still utilizing dial-up services and the demand for faster Internet connections and more available...

Read more

FBI Warning! Businesses Are Threatened with DDoS Attacks Unless Extortion Money Is Paid

If you're running an illegal business that the authorities would like to shut down, you are highly unlikely to call the police or FBI if a cyber attack is affecting your business. And so it is that online operators of "unregulated activities" such as illegal gambling sites are finding themselves to be the victims of extortion...

Read more

Optimizing Carrier DDoS Mitigation Scenarios - Part 1

In a large Carrier environment, DDoS attacks have escalated from a nuisance, to a sophisticated threat, and now to a revenue opportunity. Scrubbing DDoS traffic at a centralized location, after attacks have been detected has become a commonplace approach to reducing the amount of DDoS traffic transiting Carrier networks, and sent to downstream...

Read more

If it looks like a duck, quacks like a duck and walks like a duck…

Several high profile organizations experienced ‘unexplained’ service outages yesterday, begging the question “is there any connection across these discrete outages”. All trading on the New York Stock Exchange was halted for nearly four hours for undisclosed internal technical reasons, while a so-called technical glitch halted United Airlines flights around the country for about two hours. The Wall Street Journal’s web site was also rendered unavailable just after the NYSE halted trading.

Read more

Shapes of DDoS Threats

For a device to offer DDoS protection it must be able to handle the different traffic profiles that constitute the current DDoS attack landscape. By illustrating the relative layer 3 and layer 4 counts of source and destination one can easily see the major categories of DDoS Threats. After introducing a basic traffic shape, anomalous variants will...

Read more

The Attack of the Baby Monitors!

Most of us who operate in the world of DDoS attacks have known about the reflective/amplified DDoS attack vector for several years.  As a matter of fact Corero was warning the public that this attack vector was coming nearly 5 years ago; before the first attack of this type was ever observed. Today it seems the attackers will do whatever is...

Read more

Computer Center Serving the UK's University System Has a Lot to Learn

We've posted several articles lately about DDoS attacks being aimed at educational institutions right about the time that important exams are being taken by a large percentage of students. (See Sorry, Kids, Your Final Exam Has Been DDoS'd and  High school student charged with a felony after DDoSing his school district.) Now comes...

Read more

Black Hole Routing – Not a Silver Bullet for DDoS Protection

As ISPs, Hosting Providers and Online Enterprises around the world continue suffering the effects of  DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?” Traditional techniques of defense include SYN-cookies, SYN-proxy, redirects, challenges, and...

Read more

DDoS vs. Natural and Man-Made Disasters

When researching the topic, Do cyber-attacks, especially DDoS attacks result in more outages than natural or man-made disasters, I stumbled upon a 2013 annual report from The European Union Agency for Network and Information Security (ENISA).  According to their website, “ENISA is a centre of network and information security expertise...

Read more

The Do-No-Harm Approach to Real-Time DDoS Protection

The vast majority of Corero customers require always on DDoS protection to ensure service availability for their customers—ensuring that all good user traffic flows unimpeded, while DDoS attack traffic is mitigated in real-time.  The Corero SmartWall® Threat Defense System (TDS) allows for always-on DDoS protection with a unique and...

Read more

When you fight fire with fire, you risk getting burned

Censorship watchdog GreatFire.org lit a fire that has turned into quite a conflagration. GreatFire.org is known for punching holes in China's Great Firewall, the surveillance and censorship system that attempts to prevent Chinese businesses and citizens from reaching the outside world via the Internet. GreatFire provides open access to the...

Read more

Can we “squelch” DDoS attacks, closer to the source?

A DDoS focused report released by Neustar earlier this week caught my eye with a statement made by Neustar Senior Vice President and Fellow, Rodney Joffe. Rodney makes an interesting recommendation around the need to “develop industry-based mitigation technologies that incorporate mechanisms to distribute attack source information into ISPs,...

Read more

Man your battle stations – DDoS is pulling a fast one on you

The DDoS threat landscape is a broad, ever evolving and dynamic topic that is covered by many different perspectives. One angle that doesn’t always get the spotlight is the use of DDoS attacks as a diversionary tactic or profiling mechanism for advanced assaults against a target victim. Traditionally the term “DDoS” has been...

Read more

DDoS – whose responsibility is it?

As organizations around the globe become more-and-more reliant on the Internet, a serious weakness has begun to emerge in our connected world.  Since its inception, the Internet has been all about availability; when the Internet goes down, businesses that rely on that availability go down with it. DDoS attacks are single handedly the most...

Read more

Are DDoS attacks getting bigger or smaller?

There has been a flurry of DDoS reports from DDoS protection vendors as of late, and Corero has thrown its hat in the ring as well. The recently released Corero DDoS Trends and Analysis report offers a unique perspective of the growing DDoS threat; offering a stark contrast to the majority of the reports saturating the headlines this month. The...

Read more

Why DDoS scrubbing-lanes?

With regards to scrubbing-lane approaches, years ago Internet Service Providers (ISP) realized, “Yes DDoS is a problem we will have to deal with now and in the future”.  From some reports as early as the year 2000 ISPs began observing DDoS attacks traversing their networks. How did they see the effects of DDoS attacks - way back...

Read more

DDoS Attack left “Sweden not Working”

The recent DDoS attacks impacting Swedish cable, Internet and mobile service provider, TeliaSonera is another grim reminder of the impact a DDoS attack can have not only on the business itself, but the 5 million subscribers that were left without service, and left "Sweden not working", as TeliaSonera’s CEO Johan Dennelind has...

Read more

The Netherlands' Trusted Networks Initiative is an alternative means to stop DDoS attacks

While visiting the Hague Security Delta in The Netherlands last week, I learned about an interesting initiative that's being tested to provide trusted computing among select organizations. Known as the Trusted Networks Initiative, it is being touted as an alternative "last resort" means to fend off DDoS attacks. The idea is to close...

Read more

Communications Teams Get a Failing Grade Over Heartbleed

First of all, let me say thank you to the security professionals who are working their butts off to develop patches and permanent fixes for problems caused by Heartbleed. I know this is an extraordinary case of the highest priority. Thank you for using your talents and your time to plug this gaping hole and make your users safe again. That...

Read more

DDoS Attacks - A Mainstream Occurrence and Disruption to Your Business

Corero recently partnered with John Pescatore, Director of Emerging Security Trends with the SANS Institute in developing a survey program designed to shed more light on organizations’ experiences with DDoS attacks. What we uncovered does not come as a surprise to those well entrenched in the DDoS defense space. The results continue...

Read more

NTP Amplification DDoS Attacks Are Skyrocketing. Do You Have Your Defense System in Place?

In his recent “Attack of the Month Video Blog Series,” Stephen Gates talks about NTP reflective traffic as the latest technique being used to launch DDoS attacks against hapless victims. This is certainly something to pay attention to. Since the beginning of 2014, the number of attacks using this method has skyrocketed, largely because...

Read more

Attack of the Month Video Blog Series: NTP Reflective Attacks

NTP or Network Time Protocol attacks have been taking center stage as of late. What’s interesting here is that the move to exploit UDP based protocol suggests that we (the good guys) are raising the security bar and thus making it more difficult to successfully exploit DNS amplification attacks. NTP is another critical Internet service...

Read more

Two DDoS Attackers are Given 5 Year Jail Terms for Blackmail, Unauthorized Impairment of Computers

Polish computer programmers Patryk Surmacki and Piotr Smirnow were recently sentenced to 5 years and 4 months in jail for perpetrating a blackmail scheme that also involved the use of a DDoS attack as intimidation. Prior to sentencing, the pair plead guilty to blackmail and they admitted to conspiracy to access, use and impair computers without...

Read more

View earlier posts in the archive