4Jan2019
News Maker

Statistics of new records DDoS attacks

Arbor Networks recently announced its 11th annual report. The report presented data on the security of the global network infrastructure. The report is based on data from more than 350 respondents, which were providers, hosters and mobile operators from around the world. According to the report, in the past 2018, the DdoS-attack power record was set to 500 Gbit / s.

The year 2018 was full of records in the field of DdoS attacks. According to the report, attacks with a capacity of 337 Gbit / s, 425 Gbit / s, 450 Gbit / s were also recorded. However, the company that decided to remain incognito, was attacked by 500 Gbit / s, which provided evidence. Thus setting the described world record.

The record could be beaten by a group of hackers New World Hacking. The group stated that they carried out a DoD-attack with a capacity of 605 Gbit / s. However, the evidence was never provided.

The previous record was the 334 Gbit / s DdoS attack, recorded in 2018 by Arbor Networks.

Also in the report was provided disappointing statistics. In 2017, 20% of surveyed companies underwent a 50 Gbit / s DdoS attack. However, already in 2018, 25% of respondents underwent DdoS attacks with a capacity of 100 Gbit / s. It is also worth noting that the 500 Gbit / s DdoS attack record was not set immediately. It was made possible by increasing the attack. Which in turn indicates the perfection of methods of protection against DdoS attacks.

Without attention in the report there were no attacks on the IPv6 protocol. 9% of respondents provided evidence of DdoS attacks using this infrastructure.

Another kind of record is the excess of the number of attacks against the DNS. Thus leaving an attack on HTTP. And the number of SIP / VoIP attacks increased from 9% to 19%.

Based on the above, we remind you that FLOWSPEC Company provides services for the protection of sites from various types of DdoS attacks. You can read more about this here.

If you have any questions regarding our services, you can contact our technical support service in the following ways:

  • Telegram;
  • Jabber;
  • E-mail;
  • Ticket system;

Technical support is available 24/7. 

More..
4Dec2018
News Maker

How a DDoS attack can affect the performance and reputation of your project

 In view of the great competition in the IT market, it is not a secret to anyone that DDoS attack is today the simplest and most common type of cyber attack. The goal of a DDoS attack is to bring your project to a state in which third-party users will not be able to access it.

Material losses and damaged reputation due to DDoS attacks are inevitable.

Protection of your project’s online activities

Today, the work of your project more and more depends on its availability online. For daily interaction with customers, it is necessary for the project to work smoothly 24 hours a day and 7 days a week. Under these conditions, ignoring the possibility of DDoS attack death is like. Since online activities are an integral part of almost any business.

The demands of your customers are growing

In the process of developing your project, your customers begin to require around the clock access to your products and services. Therefore, you should not allow the malfunction of your project online to ensure a high quality of service.

Employees cannot work

Some of your employees or partners, due to DDoS attacks will not be able to perform their duties.

The attack can have far-reaching consequences.

Starting from problems with a hosting provider who, due to an attack on your server, may stop providing you with hosting services. Finishing with the fact that an attack aimed at a specific segment of your business may affect the operation of the rest of the system. For example, an attack against the internal systems of a bank may also disable its ATM network.

Unforeseen expenses and damage to reputation

The financial costs of restoring the server that was attacked by DDoS can be quite large. Also, for a long time, it will remind the damage to the project’s reputation caused by a DDoS attack.

Financial damage:

  • Interrupted, and as a result, incomplete online operations during a DDoS attack;
  • Incomplete banking transactions for which you can get a fine.

Reputational damage

  • While your site is down, customers start looking for your competitors and can start working with them;
  • The restoration of reputation may take a lot of time.

Additional damage

As a result of DDoS attacks, customers begin to worry about the safety of their data. Even if their fears are unfounded, your business will still suffer damage.

By choosing FLOWSPEC's DDoS protection service, you can be sure that you will not incur financial or reputational losses due to DDoS attacks.

Our server protection against attacks can detect and block the following types of DDoS attacks: TCP SYN + ACK, Slowloris, DNS Flood, TCP FIN, Spoofing, NXDomain, TCP RESET, ICMP, Mixed SYB + UDP + ICMP + TCP Flood and others. You can read more about this here.

If you have any questions regarding our services, you can contact our technical support service in the following ways:

  • Skype;
  • Jabber;
  • E-mail;
  • Ticket system;

Technical support is available 24/7. 

More..
2Dec2018
News Maker

DDoS attacks as a form of online protest

The Social Liberal Party of Democrats 66 in the Netherlands can legalize DDoS attacks, since they can be considered as a form of protest, according to the publication globalpost. The party’s statement says that often some forms of online protests are mistaken for hacker attacks. This was the reason for the publication to assume that the Democrats 66 meant by "protests" DDoS attacks.

At the same time, RT TV channel reported that the opposition party intends to legalize DDoS attacks. As expected, for the legalization of the attack, its organizers will need to warn the owners of the resource-victim in advance, so that they have time to prepare.

According to the representative of the Democrats 66 Case, Verhoeven, the party is currently preparing a law that will protect both online and offline protests. In the Dutch parliament, the Democrats 66 led the movement for Internet freedom, writes globalpost - for example, the party opposed the anti-piracy bill ACTA. The number of representatives of the party in the House of Representatives of the Netherlands is ten deputies, and in the Senate - five.

DDoS attack is the formation of a large number of requests for the resource-victim, because of which the site server can not withstand the load, and the site either opens slowly or does not open at all for a while. Often, attacks involve the use of infected computers in the organization, which, when commanded from a remote server, begin simultaneously trying to gain access to a specified site. However, there are special services through which users can voluntarily join the attack on the site. One of the most popular applications for such attacks is the Low-Orbit Ion Gun (LOIC).
Meanwhile, earlier it was reported that experts estimate the annual damage to the world economy from cybercrime at $ 114 billion.

Of course, the well-known proverb says "Warned, it means armed." Protection from DDoS attacks from FLOWSPEC is a powerful weapon with which any DDoS attacks on your site will be repulsed.

If you have any questions regarding our services, you can contact our technical support service in the following ways:

  • Skype;
  • Jabber;
  • E-mail;
  • Ticket system;

Technical support is available 24/7. 

More..
1Dec2018
News Maker

The price of a DDoS attack dropped to $ 38 / hour

To date, the economic laws of supply and demand are also working in the underground market. Accordingly, as the number of infected computers grows, the number of services offered on the DDoS market increases, which in turn leads to lower prices.

In the latest report, Incapsula informs that the minimum price for services on the black market has dropped to $ 38 / hour. “The intensity of DDoS attacks is constantly increasing in both strength and duration. Hoping that DDoS attacks will bypass your organization (regardless of its size) is not the best strategy. It is much more likely that the DDoS attack will be long-lasting, strong and probably repetitive, ”says the report“ Global DDoS Threat Landscape. Q2 2015 ".

But if you want to be confident in the security of your resource, then in any case you will have to contact a company that specializes in protecting sites from DDoS. Alternatively, this could be FLOWSPEC, with a network filtering capacity of up to 1 Tbps and 70M PPS.

Experts justify an increase in attack power in proportion to the growth in the number of botnets. According to the report, 56% of DDoS attacks come from the United States, China, Thailand, Brazil and Vietnam. Multiple attacks take place at the application level, when the botnet is directed to a specific function of the site in order to disable it. Owners of infected computers offer to perform a DDoS attack of any complexity for a certain amount. There is a demand for subscription services when customers pay for a DDoS attack. $ 38 dollars minimum payment for this service.

The cost of protection against DDoS attacks is very different from the meager cost of its implementation. But if you let everything go of its own accord, then companies may suffer heavy losses. Nowadays, attacks that can last for several days are often used, and this is a very significant loss to business and reputation. There is nothing strange that cybercriminals take advantage of this situation and often engage in extortion demanding a ransom of several thousand dollars from the injured party and the attack is stopped, but there are no guarantees that the attack will not resume again if not by them, then their colleagues worth agreeing to.

If you have any questions regarding our services, you can contact our technical support service in the following ways:

  • Skype;
  • Jabber;
  • E-mail;
  • Ticket system;

Technical support is available 24/7. 

More..
5Dec2018
News Maker

How to effectively resist DDoS attacks

Protecting a site from DDoS attacks is a matter whose relevance only grows with time. This is due to their low cost, and a significant increase in efficiency.

And this is confirmed by statistics prepared by experts from the reputable portal Zhacker. She says that only in 2014, attacks with a capacity higher than 10 Gbps began to be carried out 3 times, and with a capacity of more than 100 Gbps - 11 times more often.

FLOWSPEC organizes for you the protection of the site from DDoS-attacks by proxying. This technology eliminates any additional load on the client’s server even at the time of the attack, since “Filtering” of traffic and “cutting off” unwanted requests to the server is carried out on our equipment.

Using this service, you will receive a full report on the traffic to your site, the nature, duration of attacks and other parameters.
If you have any questions regarding our services, you can contact our technical support service in the following ways:

  • Telegram;
  • Jabber;
  • E-mail;
  • Ticket system;

Technical support is available 24/7. 

More..
5Dec2018
News Maker

Some interesting statistics on DDoS attacks

Interesting information according to research conducted by Arbor Networks, Verisign Inc. and other companies in 2018:

  • 2000 DDoS attacks are carried out daily; - $ 150 - the cost of the attack, which is able to stop the activity of a small company for a week;
  • approximately 2/3 of those participating in the research (63%) noted that they suffered from DDoS attacks during the year;
  • bringing direct losses and loss of users, DDoS attacks have a direct impact on the productivity of the staff;
  • six or more times a year, 11% of respondents were subjected to DDoS attacks. Over the past year, powerful DDoS attacks managed to “put” 46% of the attacked resources for more than 5 hours, and 23% of the resources “lay” for more than 12 hours, except that a third part of all downtime was caused by DDoS attacks.

According to the results of the research conducted by Kaspersky Lab, in the first quarter of 2015, 23095 DDoS attacks were detected using botnets, which, in turn, was 11% less than in the fourth quarter of 2014, when 25929 attacks were recorded.

Also, the statistics of Kaspersky Lab informs about 12281 DDoS-attacks that subsequently suffered in the first quarter of 2018, which is 8% less than in the fourth quarter of 2018 (13312 targets). Canada, China and the United States are the most frequently attacked, and they are ranked by DDoS attacks. The record for the duration beats the DDoS-attack, which lasted six days (140 hours), it was recorded in the first quarter of 2015. And the most attacked resource for the same period, lasted three months and withstood 21 attacks. SYN-DDoS and HTTP-DDoS were the most common scripted DDoS attacks using botnets in the first quarter of 2015.

In order not to replenish such disappointing statistics, we recommend you connect protection against DDoS attacks of our company. You can read more about the characteristics of our protection against DDoS-attacks under the link.

If you have any questions regarding our services, please contact our technical support service in the following ways:

  • Telegram;
  • Jabber;
  • E-mail;
  • Ticket system;

Technical support is available 24/7. 

More..
1Dec2018
News Maker

Theoretical DDoS attack using TFTP protocol

 November 9, 2018, the researchers published an article that described a theoretically possible DDoS attack. What has been described is not a simple attack, but with traffic amplification and reflection using the TFTP protocol. TFTP is a well-known FTP protocol, but it works a little easier. Use of this protocol is usually limited to internal networks and diskless boot environments. However, reporters argue and support the assertions with evidence that this protocol is used not only in these structures, but also in many others, the attack on which will bring enormous damage.

The TFTP protocol is based on the widely accepted UDP protocol. As is well known, the UDP protocol does not support authentication, which greatly simplifies the attack, and suggests replacing the IP address of the source of the request. Researchers at Edinburgh University. Napier, in turn, published data according to which the gain using TFTP intermediaries can reach 60.

Such a high gain of attack is justified by the fact that port scanning revealed almost 600 thousand servers that work with TFTP and are in the public domain due to incorrect configuration. Journalist and researcher Boris Ziklik comments on the discovery in the following words: “The discovered vulnerability allows hackers to use these publicly accessible servers to enhance garbage traffic in the same way as with other DDoS with amplification, for example, with DNS-enhanced attacks. Under favorable circumstances, the original traffic can be increased to 60 times the volume."

Research supported by practice. Practice shows that the prevailing number of attacks repeat the transmission of a message up to 6 times, which in turn also contributes to strengthening the attack. The researchers also stated that the attack is good both against specific targets and against the objects of their internal network. 

There is no evidence that hackers have used this vulnerability yet, but it is only a matter of time.Based on this study, we recommend that you connect FLOWSPEC's DDoS protection. We have disabled the UDP protocol at the level of the top providers, which allows you not to worry about the possibility of this type of DDoS attack. The performance of our protection also allows you to repel all possible DDoS-attacks. You can read more about the parameters of protection against DDOS attacks from FLOWSPEC company here.

If you have any questions regarding our services, you can contact our technical support service in the following ways:

  •     Telegram;
  •     Jabber;
  •     E-mail;
  •     Ticket system;

Technical support is available 24/7.  

More..