• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Accelerated DevOps drawing DDOS attacks, observed Imperva

FutureCIO Editors by FutureCIO Editors
September 4, 2021
Photo by Tima Miroshnichenko from Pexels

Photo by Tima Miroshnichenko from Pexels

Imperva’s 2021 DDoS report found the Asia Pacific region was the top target for network DDoS attacks in H1 2021, making up 46% of all attacks. 33% of all network DDoS attacks targeted Taiwan. The Philippines still featured in the top five but decreased significantly from 35% to 12%.

Reinhart Hansen, CTO for Imperva Asia Pacific and Japan said this is likely due to the region’s acceleration of DevOps programs and practices during COVID.  This has led to a major increase in the number of Internet-facing applications that organisations are releasing and hence a much larger attack surface for cybercriminals to target.

“The cybercriminal groups that use more advanced application-layer DDoS attacks usually have a more sophisticated mindset and skill set.  Their members typically have strong software development skills and the know-how to build highly targeted attack tooling.”

In terms of industries, computing and IT organisations accounted for almost 30% of all application layer attacks mitigated by Imperva in H1 2021, followed closely by business services (25%) and financial services (22%).

Shorter attacks confound legacy defences

Imperva Research Labs found a clear trend towards shorter, higher volume attacks. Since 2020, DDoS attacks have increased four-fold, the volume has doubled, and the average attack duration is just six minutes.

“This type of attack is designed to take out organisations with low or legacy defences, including those that mistakenly assume their telecommunications or internet service provider (ISP) will automatically provide a level of DDoS protection,” Hansen said.

He opined that not all ISPs and telcos provide their customers with DDoS protection. Of those that do, most don’t typically protect against all the different types of DDoS attacks.

They also tend to use in-house technology and solutions that are not ‘always-on’ and don’t leverage a global mitigation approach. Instead, they offer a manual or semi-automated response that uses localised mitigation.

This is simply not effective in protecting against these global, highly distributed, short, sharp, persistent attacks. In fact, the network routing changes that are enacted by ISPs and telcos to mitigate these attacks usually compound the duration and disruption of the attack itself. 

“The worst case is that they null route your organisation’s ingress internet traffic until the attack is over.  This effectively protects their own shared customer infrastructure from the effects of an attack, but it takes the targeted organisation totally offline,” continued Hansen.

DDoS used as a distraction

Shorter attacks can signal another danger – they may be a distraction tactic as part of a wider multi-vector attack.

Hansen explained that DDoS causes all this noise in an organisation’s network and infrastructure, making it hard to detect other incidents that might be taking place. “Cybercriminals can use that as cover to conduct some kind of lateral movement or data exfiltration exercise with less chance of being detected,” he continued.

Low barrier to entry and high returns

The barriers to launch a DDoS attack are extremely low, Hansen said.

“The tools for launching a DDoS attack are readily available via DDoS-for-hire sites on the dark web and even the normal internet. This means anyone can launch a DDoS attack without much effort or knowledge on how to do it. And it is cheap - costing as little as $5 an hour,” he said.

Imperva’s research indicates that such services are increasing in popularity as they generally use less sophisticated attack vectors such as Transmission Control Protocol (TCP). In the last 12 months, packet-based TCP attacks increased from just over 10% to almost 32%, and bandwidth-based TCP attacks grew from 4% to 18%.

However, while DDoS attacks are cheap and easy to use, they can have a devastating impact on a business. One hour of downtime costs a business $100k on average, and a quarter of DDoS targets are hit ten times or more.

Downtime and major disruption to revenue-producing activities isn’t the only way DDoS threat actors can make you pay. Ransom threats are on the rise.

Imperva researchers have monitored threats against several of its customers where extortionists have demanded payment in BitCoin to prevent launching a DDoS attack. Demands of more than US$1m are not unusual.

Related:  IDC: Cloud-based services to see the decline in traditional ITOps
Tags: cybercriminalsDDoSDevOps
FutureCIO Editors

FutureCIO Editors

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe