The frequency of distributed denial of service (DDoS) attacks continued to rise during the second quarter of 2015, doubling year-on-year for the third quarter in succession as instances of “mega attacks” also became more common, according to research.
Akamai’s Security State of the Internet report found that although such assaults are becoming less powerful but longer, there were 12 attacks peaking at more than 100Gbps, a 100 percent year on year rise, and five that peaked at more than 50 million packets per second (Mpps).
The largest such mega-attack weighed in at 240Gbps and lasted more than 13 hours while the largest ever packet rate attack detected came in 14 214Mbps – enough to take out tier 1 routers used by ISPs.
Many of these attacks make used of Simple Service Discovery Protocol (SSDP), a common protocol enabled by default on millions of home and office devices, such as routers, smart TVs, printers and webcams, to allow them to discover each other. However if SSDP is left unsecured or misconfigured, such devices can act as “reflectors” to enhance the ferocity of DDoS.
SSDP now accounts for 16 percent of attacks, the same as SYN flooding, with online gaming the most common target. A DDoS attack on Natwest earlier this month left 6.5 million people unable to access online banking services for 50 minutes.
“The threat posed by distributed denial of service (DDoS) and web application attacks continues to grow each quarter,” said John Summers, vice president, cloud security Business Unit, Akamai. “Malicious actors are continually changing the game by switching tactics, seeking out new vulnerabilities and even bringing back old techniques that were considered outdated.”
“For example, for this report, we not only added two web application attack vectors to our analysis, we also examined the perceived threat posed by the onion router (Tor) traffic and even uncovered some new vulnerabilities in third-party WordPress plugins which are being published as CVEs. The more you know about cyber security threats, the better you can defend your enterprise.”
WordPress is an attractive target for attackers due to its popularity and the fact that virtually none of its plug-ins are assessed for vulnerabilities. Akamai tested 1,300 of the most popular plug-ins and themes and discovered 49 new vulnerabilities in 25 of them. Such vulnerabilities can be used to create botnets, spread malware and create reflectors for DDoS attacks.
Finally, the report also assessed the threat of Tor. Although 99 percent of attacks came from non-Tor IP addresses, one in 380 requests out of Tor exit nodes were malicious compared to one in 11,500 non-Tour IPs.
Although this suggests Tor is more likely to be used for illegitimate reasons than the normal web, Akamai is firmly on the fence about blocking Tor traffic, noting this could have a “negative business effect.”
Are you a security pro? Try our quiz!
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…
US Supreme Court says it will hear appeal of TikTok and parent ByteDance against ban…
Japanese start-up Space One destroys Kairos rocket for second time shortly after launch, as country…
World's biggest EV battery maker CATL aims to build 1,000 battery-swap stations next year, rising…
Facebook has 'severely restricted' news content from Palestinian outlets since October 2023 amidst bias concerns,…