Kaspersky Lab DDoS Intelligence Report Shows Decrease In Global Reach Of Attacks, Increase In Sophistication
Kaspersky Lab has published itsDDOS Intelligence Report for Q4 2015*. The reporting period was marked by a decrease in the number of countries where resources are targeted as well as by new attack channels used by cybercriminals to disable resources. The fourth quarter also saw the longestbotnet-based DDoS attackin 2015, which lasted more than two weeks.
Resources in 69 countries were targeted by botnet-assisted attacks (compared to 79 in Q3). As in the previous quarter, the vast majority of attacks(94.9%)took place in just 10 countries.There were some minor changes among the leaders in Q4, but China, South Korea and the US remained the worst-affectedcountries.
The longest DDoS attack in Q4 lasted 371 hours (or 15.5 days)– arecord for 2015. During the reporting period cybercriminals launched attacks using bots from different families. In Q3, the proportion of such complexattacks was 0.7%, while in the final three months of the year it reached 2.5%. The popularity of Linux bots also continued to grow – from 45.6% to 54.8%of all DDoS attacks registered in Q4 2015.
Among other trends observed in Q4 were new channels for carrying out reflection DDoS attacks that exploit weaknesses in a thirdparty’s configuration to amplify an attack. In particular, the fourth quarter saw cyber criminals send traffic to targeted sites via NetBIOS name servers, domain controller PRC services connected via a dynamic port, and to WD Sentinel licensing servers. The attackers also continued to use IoT devices– for example, researchers identified about 900CCTV cameras around the world that formed a botnet used for DDoS attacks.
Kaspersky Lab experts also detected a new type of attack on web resources powered by the WordPress content management system (CMS). This involved JavaScript code being injected into the body of web resourcesthatthen addressed thetarget resource on behalf of the user’s browser.The power of one such DDoS attack amounted to 400 Mbit/sec and lasted 10 hours. The attackers used a compromised web application running WordPress, as well as an encrypted HTTPS connection to impede any traffic filteringthat may beused by the owner of the resource.
“We can see that the complexity and the power of DDoS attacks have not diminished with time, even if the number of attacked resources has fallen. Unfortunately, DDoS remains a convenient and affordable tool for online crime because there are still software vulnerabilities thatattackers can useto penetrate servers.There are also users who fail to protect their devices, increasing the chances of those devices being infected by bots. For our part, we are committed to providing businesseswith information about the DDoS threat and promoting the fight against it, because DDoS is a threat that can and should be combated,”comments Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab.
Kaspersky DDoS Protection combinesKaspersky Lab’s extensive experience in combating cyber threats and the company’s unique in-house developments. The solution protects against all types of DDoS attacks regardless of their complexity, power and duration. Moreinformationaboutthesolutionisavailablehere.
*The Kaspersky DDoS Intelligence system (part of Kaspersky DDoS Protection) is designed to intercept and analyze commands sent to bots from command and control (C&C) servers, and does not have to wait until user devices are infected or cybercriminal commands are executed in order to gather data.It is important to note that DDoS Intelligence statistics are limited to those botnets that were detected and analyzed by Kaspersky Lab.