August 20, 2015 By Shane Schick 2 min read

Cybercriminals are using everything from home routers and WordPress plugins to legacy directory services to launch a DDoS attack, which may explain why recent research shows instances of these attacks more than doubling over the past year.

Akamai recently published a report, titled “Q2 2015 State of the Internet – Security Report,” which showed the number of distributed denial-of-service (DDoS) attack incidents exceeding 100 Mbps has risen over the past quarter, along with those aimed specifically at the application or infrastructure layers of corporate IT environments. Perhaps most disturbing is the relatively low-grade channels cybercriminals have exploited to launch DDoS requests. Specifically, the research indicated cybercriminals are taking advantage of flaws in WordPress plugins or home routers owned by consumers, which could be harder for CISOs and their teams to track.

Experts told CSO Online that attackers are also increasingly looking at Tor, the network designed with anonymity in mind. Launching a DDoS attack this way would most likely do damage at the application level, but blocking all such anonymous traffic may mean organizations alienate legitimate customers, as well.

At the other end of the spectrum are more sophisticated cybercriminals, some of whom recently took advantage of RCS Portmapper, a relatively older Linux director service, to launch an advanced DDoS attack. Techworld explained the approach in detail: Portmapper was hit by Internet traffic that looked genuine but in fact led back to a malicious target. Though this technique was noticed after the fact, it’s a good reminder that legacy protocols may be more vulnerable to cybercriminals who know what they’re doing.

On the plus side, there seems to be equally strong efforts by government and law enforcement agencies to think of ways to better defend against a DDoS attack. SC Magazine reported that the U.S. Defense Advanced Research Projects Agency (DARPA) is working on a program called XD3, or Extreme DDoS Defense, which would not only recognize when servers were hit by malicious traffic, but also respond to the attacks within as little as 10 seconds.

Although this project may be initially piloted by military organizations, if it’s successful, large organizations may eventually get access to it, as well. Let’s hope so, because there is certainly no indication that these threats are going to fade away anytime soon.

More from

Remote access risks on the rise with CVE-2024-1708 and CVE-2024-1709

4 min read - On February 19, ConnectWise reported two vulnerabilities in its ScreenConnect product, CVE-2024-1708 and 1709. The first is an authentication bypass vulnerability, and the second is a path traversal vulnerability. Both made it possible for attackers to bypass authentication processes and execute remote code.While ConnectWise initially reported that the vulnerabilities had proof-of-concept but hadn’t been spotted in the wild, reports from customers quickly made it clear that hackers were actively exploring both flaws. As a result, the company created patches for…

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today