DDoS attackers have gained a new target with the rise in value of cryptocurrency and the corresponding boom in new cryptocurrencies, namely the exchanges that power the trades between different cryptocurrencies, in addition to the computer systems … [Read more...] about DDoS and the Cryptocurrency Craze
DDoS
What is a Specially Crafted DDoS Attack?
In a specially crafted packet attack, attackers customize their approach to DDoS. Attention from the security community has recently focused more on these kinds of fragmented and application-layer DDoS attacks, in addition to the volumetric and … [Read more...] about What is a Specially Crafted DDoS Attack?
What is Remotely-Triggered Black Hole (RTBH) Routing?
Remotely-Triggered Black Hole (RTBH) routing is a kind of application of BGP as a security tool within a service provider network. RTBH is frequently deployed in the mitigation of DDoS attacks, particularly when incoming traffic needs to be blocked … [Read more...] about What is Remotely-Triggered Black Hole (RTBH) Routing?
Hackable IoT Cameras: DDoS Attacks are Just the Tip of the Iceberg
Hacking a CCTV camera is worryingly easy. Many such devices have poor security practices with default passwords and remote access enabled from installation. The bandwidth of vulnerable IP cameras can easily be put into service as part of a botnet … [Read more...] about Hackable IoT Cameras: DDoS Attacks are Just the Tip of the Iceberg
The Demise of the Election Hacking Kelihos Botnet
Last April, the U.S. Justice Department was finally able to report that a suspect had been arrested in the Kelihos botnet case. Peter Yuryevich Levashov, a Russian citizen who allegedly ran the Kelihos botnet since at least 2010, was arrested in … [Read more...] about The Demise of the Election Hacking Kelihos Botnet
vDoS Booter Service and the Attack against Brian Krebs
Before Mirai came into the public eye, the FBI was working on a case involving two teens running a DDoS-for-hire service called vDOS. Two young Israeli men were using the massive vDOS botnet to offer a booter service, aimed at helping gamers knock … [Read more...] about vDoS Booter Service and the Attack against Brian Krebs
The Men Behind Mirai
Last month, three men pleaded guilty to creating the Mirai botnet, in which hundreds of thousands of connected digital video records, routers and cameras were used to launch a massive DDoS attack against the domain name services company, Dyn for an … [Read more...] about The Men Behind Mirai
DDoS Attacks in Cloud Computing
Cloud computing allows on-demand access to a shared pool of resources, including networks, servers, storage and services. DoS and DDoS attacks are serious threats to the availability of services offered on the cloud because of the various new … [Read more...] about DDoS Attacks in Cloud Computing
2017 Trends in DDoS, According to Corero
Cybersecurity firm Corero Network Security issued a year-end report, focused on Q2 and Q3 2017, showing that DDoS attacks had doubled over the six month period. Its researchers largely attributed this rapid growth to unsecured Internet of Things … [Read more...] about 2017 Trends in DDoS, According to Corero
The Evolving DDoS Landscape, According to Fastly
Fastly recently published its end-of-year post looking at the evolving DDoS landscape. Fastly has scaled rapidly since its founding in 2011 as a CDN into an edge cloud platform serving more than 10% of all Internet requests worldwide, putting it … [Read more...] about The Evolving DDoS Landscape, According to Fastly
What is a Ping of Death?
A Ping of Death (PoD) is a DoS attack caused by an attacker sending oversized or malformed packets using a PING command to a targeted computer or service. A PING operates by sending ICMP echo request packets to the host and waiting for an Internet … [Read more...] about What is a Ping of Death?
What is a Ping Flood?
A Ping Flood is an evolved variant of an ICMP Flood in which attackers use PING, a variant ICMP to send highly-spoofed PING (ICMP) echo requests at a high rate and from large range of random source IPs, or as if they are the IP address of the … [Read more...] about What is a Ping Flood?
What is an IP Fragmentation Attack?
There are various kinds of IP fragmentation attacks, and they are a fairly common form of DDoS attack. All fragmentation attacks involve the breakdown of datagrams to overbear the target networks, but the difference lies in how the attack vectors are … [Read more...] about What is an IP Fragmentation Attack?
What is a DNS Flood?
A DNS Flood is a type of DDoS attack in which DNS is employed as a variant of a UDP Flood. Spoofed DNS request packets are sent at a high packet rate and from a large volume of source IP addresses. The victim’s DNS servers believe that these are … [Read more...] about What is a DNS Flood?
What is a UDP Flood?
A UDP Flood Attack involves the sending of highly-spoofed UDP packets at an extremely high packet rate using a wide source IP range. The unexpectedly high volume of incoming UDP packets overwhelms the victim’s network, exhausting its resources and … [Read more...] about What is a UDP Flood?