Loading...
You are here:  Home  >  24/7  >  Current Article

DNS amplification attacks rise twofold in Q1, according to Nexusguard DDoS attack data

By   /  June 13, 2018  /  Comments Off on DNS amplification attacks rise twofold in Q1, according to Nexusguard DDoS attack data

    Print       Email

Source: Media Outreach
Cybersecurity researchers advise organizations seek virtual patches, secure configurations throughout device and service lifecycles SAN FRANCISCO, UNITED STATES – Media OutReach – June 13, 2018 – DNS amplification types of DDoS attacks doubled in the first quarter of 2018 over last quarter, and spiked nearly 700 percent year-over-year, according to Nexusguard’s “Q1 2018 Threat Report.” The quarterly report, which analyzes thousands of global cyber attacks, reported that 55 of the attacks were due to exploited Memcached servers. The vulnerable servers pose a significant new risk if not properly configured, similar to exposed servers enabled by Domain Name System Security Extensions (DNSSEC), a major threat in Q4. The poor configurations left unchecked can cause the amplified traffic to bring about the highest multiplying effect ever. Similar to vulnerable IoT devices deployed with little or no security, exposed Memcached servers can give cyber criminals openings to mount attacks amplified by a factor of 51,000 times, making them the most efficient attack tool to date. Although service providers were able to decrease the number of vulnerable Memcached servers over the past few months, Nexusguard researchers urge organizations to ensure security is built in to devices or services from inception through deployment, including new security configurations and virtual patches throughout lifecycles. “Cyber attackers continue to seek new vulnerabilities to pursue more firepower, launching more amplification attacks through unguarded Memcached servers and poorly configured DNSSEC-enabled DNS servers the past two quarters, and we expect this trend to continue,” said Juniman Kasman, chief technology officer for Nexusguard. “To stay ahead of cybercriminals, businesses will need to ensure security is a top priority from development through to rollout, rather than leaving it as an afterthought.” Hackers also continue to favor multi-vector approaches to help launch volumetric attacks, blending combinations of DNS amplification, network time protocol (NTP), universal datagram protocol (UDP) and other popular attack vectors in more than half of all botnets over the last three months. China and the U.S. dominated as the top two sources of DDoS attacks in Q1, contributing 15.2 percent and 14.2 percent of the botnets, respectively. Vietnam climbed to third place, contributing more than seven percent of the global attacks. Nexusguard’s quarterly DDoS threat research gathers real-time attack data from botnet scanning, Honeypots, internet service providers (ISPs) and traffic moving between attackers and their targets to help companies identify vulnerabilities and stay informed about global cyber security trends. Read the full “Q1 2018 Threat Report” for more details. About NexusguardFounded in 2008, Nexusguard is a leading cloud-based distributed denial of service (DDoS) security solution provider fighting malicious internet attacks. Nexusguard ensures uninterrupted internet service, visibility, optimization and performance. Nexusguard is focused on developing and providing the best cybersecurity solution for every client across a range of industries with specific business and technical requirements. Nexusguard also enables communication service providers to deliver DDoS protection solution as a service. Nexusguard delivers on its promise to provide you with peace of mind by countering threats and ensuring maximum uptime. Visit www.nexusguard.com for more information.
Published and distributed with permission of Media-Outreach.com.

    Print       Email