Imperva’s 2021 DDoS report found the Asia Pacific region was the top target for network DDoS attacks in H1 2021, making up 46% of all attacks. 33% of all network DDoS attacks targeted Taiwan. The Philippines still featured in the top five but decreased significantly from 35% to 12%.
Reinhart Hansen, CTO for Imperva Asia Pacific and Japan said this is likely due to the region’s acceleration of DevOps programs and practices during COVID. This has led to a major increase in the number of Internet-facing applications that organisations are releasing and hence a much larger attack surface for cybercriminals to target.
“The cybercriminal groups that use more advanced application-layer DDoS attacks usually have a more sophisticated mindset and skill set. Their members typically have strong software development skills and the know-how to build highly targeted attack tooling.”
In terms of industries, computing and IT organisations accounted for almost 30% of all application layer attacks mitigated by Imperva in H1 2021, followed closely by business services (25%) and financial services (22%).
Shorter attacks confound legacy defences
Imperva Research Labs found a clear trend towards shorter, higher volume attacks. Since 2020, DDoS attacks have increased four-fold, the volume has doubled, and the average attack duration is just six minutes.
“This type of attack is designed to take out organisations with low or legacy defences, including those that mistakenly assume their telecommunications or internet service provider (ISP) will automatically provide a level of DDoS protection,” Hansen said.
He opined that not all ISPs and telcos provide their customers with DDoS protection. Of those that do, most don’t typically protect against all the different types of DDoS attacks.
They also tend to use in-house technology and solutions that are not ‘always-on’ and don’t leverage a global mitigation approach. Instead, they offer a manual or semi-automated response that uses localised mitigation.
This is simply not effective in protecting against these global, highly distributed, short, sharp, persistent attacks. In fact, the network routing changes that are enacted by ISPs and telcos to mitigate these attacks usually compound the duration and disruption of the attack itself.
“The worst case is that they null route your organisation’s ingress internet traffic until the attack is over. This effectively protects their own shared customer infrastructure from the effects of an attack, but it takes the targeted organisation totally offline,” continued Hansen.
DDoS used as a distraction
Shorter attacks can signal another danger – they may be a distraction tactic as part of a wider multi-vector attack.
Hansen explained that DDoS causes all this noise in an organisation’s network and infrastructure, making it hard to detect other incidents that might be taking place. “Cybercriminals can use that as cover to conduct some kind of lateral movement or data exfiltration exercise with less chance of being detected,” he continued.
Low barrier to entry and high returns
The barriers to launch a DDoS attack are extremely low, Hansen said.
“The tools for launching a DDoS attack are readily available via DDoS-for-hire sites on the dark web and even the normal internet. This means anyone can launch a DDoS attack without much effort or knowledge on how to do it. And it is cheap - costing as little as $5 an hour,” he said.
Imperva’s research indicates that such services are increasing in popularity as they generally use less sophisticated attack vectors such as Transmission Control Protocol (TCP). In the last 12 months, packet-based TCP attacks increased from just over 10% to almost 32%, and bandwidth-based TCP attacks grew from 4% to 18%.
However, while DDoS attacks are cheap and easy to use, they can have a devastating impact on a business. One hour of downtime costs a business $100k on average, and a quarter of DDoS targets are hit ten times or more.
Downtime and major disruption to revenue-producing activities isn’t the only way DDoS threat actors can make you pay. Ransom threats are on the rise.
Imperva researchers have monitored threats against several of its customers where extortionists have demanded payment in BitCoin to prevent launching a DDoS attack. Demands of more than US$1m are not unusual.