Wednesday, February 3, 2021

Neustar highlights rise in ransom-related DDoS attacks and greater use of existing attack vectors

 






 Extortion demands grew in 2020, as cyber criminals targeted new online industries



LONDON-Tuesday 2 February 2021 [ AETOS Wire ]


(BUSINESS WIRE) -- Neustar, Inc., a global information services and technology company and leader in identity resolution, has today published its report entitled ‘Cyber Threats and Trends: Pandemic Style’, detailing the security risks faced by companies as the COVID-19 pandemic accelerated the digital revolution.


Informed by data from Neustar’s Security Operations Center (SOC), the report reveals a 154 percent increase in the number of attacks between 2019 and 2020, with growth in ransom-related DDoS (RDDoS) attacks and a rise in use of existing attack vectors, including web applications. The report also provides key details around the amount, size, duration and intensity of DDoS attacks throughout 2020 to keep cyber security professionals informed.


DDoS ransom attacks on the rise


Primarily, the report highlights a rise in ransom-related DDoS attacks, by which extortion demands are issued against organisations. These attacks grew in persistence and sophistication, as well as by target, compared to previous years.


While RDDoS is not a new phenomenon for many online industries, attackers have recently set their sights on organisations across a wider variety of sectors including financial services, government and telecommunications.


One reason for the adoption of DDoS as a ransom vector, as opposed to using malware, is the ease with which such attacks can be carried out. Infecting an organisation’s networks with malware or ransomware takes time and careful planning. Launching a DDoS attack, in comparison, has become relatively simple and has the added benefit of being harder to trace back to its origin.


2020 saw bad actors posing as prolific threat groups such as Fancy Bear in ransom notes – capitalising on fear of high-profile nation-state attacks – and threatening DDoS attacks unless the ransom was paid within a specific time frame.


“Organisations should avoid paying these ransoms,” said Michael Kaczmarek, Vice President of Security Product Management at Neustar. “Instead, any attack should be reported to the nearest law enforcement field office, as the information may help identify the attackers and ultimately hold them accountable. Beyond this, organisations can prepare by setting up a robust DDoS mitigation strategy, including assessing the risks, evaluating available solutions, considering mitigation strategies and keeping their plan and provider up to date.”


Existing attack vectors


While 2020 did not see any dramatically new attack vectors emerge, there was certainly a greater use of existing ones like web applications, which were the top targeted hacking vector in 2020.


Numerous built-in access protocols, which have been increasingly exploited as attack vectors, came up again in 2020. In fact, the FBI issued an alert in July warning that common network protocols like ARMS (Apple Remote Management Services), WS-DD (Web Services Dynamic Discovery) and CoAP (Constrained Application Protocol) were being abused by hackers to conduct DDoS reflection and amplification attacks – while cautioning that disabling them could cause a loss in business productivity and connectivity.


In response to this heightened threat level, the results of the latest Neustar International Security Council (NISC) survey indicated that more cyber security professionals are outsourcing DDoS mitigation, having increased by a full percentage point in the last quarter alone.


DNS attacks


In 2020, Neustar also saw an increase in attacks on the Domain Name System itself — or what look like attacks, as bad actors abuse the system.


“Acting as the Internet’s address book and backbone of today’s digital services, it’s unsurprising that DNS is an increasingly appealing target for malicious actors, particularly as more consumers turn to websites during peak online shopping periods,” said Rodney Joffe, Senior Vice President and Fellow, Neustar.


Recent NISC survey data supports this trend, with three in five respondents in a December 2020 study reporting they had fallen victim to a DNS attack in the last year. Even more concerning, over 70 percent of organisations admitted to having reservations about their awareness of, and ability to respond to, DNS attacks.


The total number of DDoS attacks Neustar mitigated on behalf of its customers in 2020 increased by more than two and a half times over 2019. The largest attack size observed during this time was also the largest that Neustar has ever mitigated and, at 1.17 Terabits per second (Tbps), among the largest ever seen on the Internet. The longest duration for a single attack was also the longest Neustar has mitigated, at 5 days and 18 hours.


A copy of the Neustar report is available here.


About Neustar


Neustar is an information services and technology company and a leader in identity resolution providing the data and technology that enables trusted connections between companies and people at the moments that matter most. Neustar offers industry-leading solutions in Marketing, Risk, Communications and Security that responsibly connect data on people, devices and locations, continuously corroborated through billions of transactions. Neustar serves more than 8,000 clients worldwide, including 60 of the Fortune 100. Learn how your company can benefit from the power of trusted connections here: https://www.home.neustar.


View source version on businesswire.com: https://www.businesswire.com/news/home/20210128005015/en/


Contacts

Jenny Morris

Hotwire for Neustar

+44 (0)7393465529

neustaruk@hotwireglobal.com





Permalink : https://www.aetoswire.com/news/neustar-highlights-rise-in-ransom-related-ddos-attacks-and-greater-use-of-existing-attack-vectors/en



No comments:

Post a Comment