web analytics
364 NEWS
No Result
View All Result
Tuesday, May 17, 2022
  • Login
  • Home
  • World
  • Economy
  • Business
  • Markets
  • Tech
  • Real Estate
Subscribe
364 NEWS
  • Home
  • World
  • Economy
  • Business
  • Markets
  • Tech
  • Real Estate
No Result
View All Result
364 NEWS
No Result
View All Result
Home Tech

Attackers enlist cloud providers in large HTTPS DDoS hit

by admin
April 30, 2022
in Tech
0
Attackers enlist cloud providers in large HTTPS DDoS hit
152
SHARES
1.9k
VIEWS
Share on FacebookShare on Twitter

cherezoff – stock.adobe.com

A recent large-scale DDoS incident shows how cyber criminals are switching up their tactics to conduct more sophisticated attacks

Alex Scroxton

By

  • Alex Scroxton,
    Security Editor

Published: 29 Apr 2022 11:45

A massive HTTPS distributed denial of service (DDoS) attack against an undisclosed organisation has highlighted a new trend among attackers of exploiting large-scale cloud computing services to build their botnets, rather than compromising consumer endpoints and devices.

The attack against an unnamed Cloudflare customer, a cryptocurrency launchpad operator specialising in surfacing decentralised finance projects to potential investors, was thwarted earlier in April 2022, and although it lasted less than 15 seconds, made approximately 15.3 million requests-per-second (rps), making it one of the largest HTTPS DDoS attacks ever seen.

HTTPS DDoS attacks differ from application-layer DDoS attacks because they require significantly more computational resources to establish a secure transport layer security (TLS) encrypted connection.

Cloudflare’s Omer Yoachimik and Julien Desgats said it was noteworthy that the attack originated mostly from within datacentres, and that they were increasingly seeing a “big move” from residential network internet service providers (ISPs) to cloud compute ISPs.

In this instance, the top originating networks were those of Germany’s Hetzner Online, Colombia’s Azteca Comunicaciones and France’s OVH. The botnet comprised about 6,000 unique bots located in 112 countries, with 15% of the traffic originating from Indonesia, followed by Russia, Brazil, India, Colombia and the US.

Nasser Fattah, who chairs risk management firm Shared Assessments’ North American steering committee, said: “What makes this attack concerning is that the traffic is coming from datacentres, which are equipped with very large network bandwidth pipes, unlike residential homes.

“This enables DDoS attacks to scale to very large sizes, and the larger the attack the more difficult it is to protect against, which is good to know if these datacentres are looking at network consumption that is considerably spiking and deviating from the normal baseline.”

Rajiv Pimplasker, CEO of Dispersive Holdings, a multipath virtual private network (VPN) specialist, added: “The shift of the DDoS attack vector from ISPs to the datacentre and CSP environment is noteworthy, and indicative of the growing sophistication and organisation of such bad actors. While this mitigation approach can be effective, a more elegant strategy can be employed that shifts the protection to avoidance, which is far superior; a secure virtualised network fabric can deliver smart services from behind private firewalls and essentially be non-routable. This fundamentally avoids such attacks in the first place.”

While such an approach still leaves publicly routable transport nodes vulnerable to some types of DDoS, said Pimplasker, these resources can be obfuscated using managed attribution, with traffic dynamically rolled away from impacted resources. He said this would also make the target environment effectively self-healing even without active management or monitoring and avoidance – not just for HTTPS DDoS attacks but for other types, too.

Though correctly regarded as a relatively primitive tool in the cyber criminal arsenal, DDoS attacks continue to prove highly popular, likely because they are simple to carry out and require little expertise – indeed, DDoS botnets-for-rent can be obtained for very small sums of money.

A recent report from Kaspersky found that DDoS attacks hit an all-time high during the first three months of 2022, up 46% on the previous peak in the past three months of 2021. The use of advanced, targeted attacks also showed a notable growth, as did the duration of DDoS sessions – the average attack now lasts 80 times longer.

“The upward trend was largely affected by the geopolitical situation [but] what is quite unusual is the long duration of the DDoS attacks, which are usually executed for immediate profit,” said Kaspersky security expert Alexander Gutnikov. “Some of the attacks we observed lasted for days and even weeks, suggesting they might have been conducted by ideologically motivated cyber activists.

“We’ve also seen that many organisations were not prepared to combat such threats. All these factors have caused us to be more aware of how extensive and dangerous DDoS attacks can be. They also remind us that organisations need to be prepared against such attacks.”





Read more on Data breach incident management and recovery


  • Zhadnost DDoS botnet deployed against Finland

    By: Alex Scroxton


  • distributed denial-of-service (DDoS) attack

    By: Ben Lutkevich


  • Radware: DDoS amplification attacks increasing, evolving

    By: Mekhala Roy


  • FBI: How we stopped the Mirai botnet attacks

    By: Rob Wright

Read More

Tags: Attackersenlist
  • Trending
  • Comments
  • Latest
Does omicron cause unusual symptoms?

Does omicron cause unusual symptoms?

December 13, 2021
Edmonton Police helping families in need through Holiday Heroes campaign

Edmonton Police helping families in need through Holiday Heroes campaign

December 20, 2021
One person dead following incident at SilverStar Mountain Resort

One person dead following incident at SilverStar Mountain Resort

December 20, 2021
Amazon staff had to use bathrooms as tornado shelters

Amazon staff had to use bathrooms as tornado shelters

December 13, 2021
Hashtag Trending Dec. 8 – Massive numbers of YouTube copyright strikes; Microsoft seizes hacker’s servers; Outage at AWS

Hashtag Trending Dec. 8 – Massive numbers of YouTube copyright strikes; Microsoft seizes hacker’s servers; Outage at AWS

0
With Stimulus Benefits Ending, What Should Small Business Owners be Aware of?

With Stimulus Benefits Ending, What Should Small Business Owners be Aware of?

0
7 Ways to Be a Truly Customer-Focused Business

7 Ways to Be a Truly Customer-Focused Business

0
Assumptions Can Hold Your Company’s Success Hostage. Here’s How to Fight Them

Assumptions Can Hold Your Company’s Success Hostage. Here’s How to Fight Them

0
Vladimir Putin’s battered troops scale back offensive on Donbas as ‘1 in 3’ Russians dead

Vladimir Putin’s battered troops scale back offensive on Donbas as ‘1 in 3’ Russians dead

May 17, 2022
Brexit Britain set to tear up Northern Ireland Protocol

Brexit Britain set to tear up Northern Ireland Protocol

May 17, 2022
GB News guest lets rip as row erupts over Thatcher’s statue

GB News guest lets rip as row erupts over Thatcher’s statue

May 17, 2022
GB News: ‘Be a low tax party!’ Tory MP outlines his vision for renewed Conservative policy

GB News: ‘Be a low tax party!’ Tory MP outlines his vision for renewed Conservative policy

May 17, 2022
  • Home
  • Advertisement
  • Contact Us
  • Privacy & Policy
  • Other Links

© 2021 364News - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Advertisement
  • Contact Us
  • Homepages
    • News 364
  • World
  • Economy
  • Business
  • Opinion
  • Markets
  • Tech
  • Real Estate

© 2021 364News - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In