Distributed denial of service (DDoS) attacks are increasingly blended attacks targeting four or more vulnerabilities, according to Nexusguard's Q4 2016 Threat Report. Over Q416 the company discovered the attack pattern against financial and government institutions in Q416.
Nexusguard, the DDoS security solutions provider, analysed a network of vulnerable devices for new cyberthreats across national and organisational boundaries. The company scans attack data for trends in vectors, duration, sources and other characteristics to inform organisations of the latest attack methods.
The supersized Mirai attack from Q316 set the stage for Q4 challenges, resulting in a ripple of botnets from connected devices and the Internet of Things (IoT). At the close of 2016, Nexusguard researchers observed more than 426,700 bots executed since IoT botnet monitoring began in October. Attacks skyrocketed 150% between November and December, which researchers attributed to the sharing of the Mirai botnet source code. The growth of sophisticated DDoS attacks quickly overloaded systems and impeded the identification of hacking activities in Q4.
"The popularity of the Mirai botnet and similar IoT vulnerabilities gave hackers ample ammo to overwhelm security and operations in Q4," said Juniman Kasman, CTO for Nexusguard. "Malicious actors will continue to invent new attacks and blend them with multiple factors for maximum impact, forcing companies to rely on big data and intelligence-driven mitigation, and develop strategic response teams that can quickly handle new threats."
Nexusguard analysts found China and the US were most vulnerable to IoT botnets, with 116,000 and 41,200 IoT botnets recorded respectively. While hackers continue to switch tactics to confuse cybersecurity teams, 97.5% of DDoS attacks used NTP vulnerabilities, the most popular DDoS attack method, in 2H16.
Researchers predict IoT botnets will continue to pose major cybersecurity challenges in 2017, causing more volumetric attacks at higher frequencies.
Nexusguard recommends organisations evaluate in-house capabilities alongside outsourced bandwidth to ensure support teams can analyse incidents and recommend solutions in a timely fashion.
Interested?
Read the Q4 2016 Threat Report
posted from Bloggeroid
Nexusguard, the DDoS security solutions provider, analysed a network of vulnerable devices for new cyberthreats across national and organisational boundaries. The company scans attack data for trends in vectors, duration, sources and other characteristics to inform organisations of the latest attack methods.
The supersized Mirai attack from Q316 set the stage for Q4 challenges, resulting in a ripple of botnets from connected devices and the Internet of Things (IoT). At the close of 2016, Nexusguard researchers observed more than 426,700 bots executed since IoT botnet monitoring began in October. Attacks skyrocketed 150% between November and December, which researchers attributed to the sharing of the Mirai botnet source code. The growth of sophisticated DDoS attacks quickly overloaded systems and impeded the identification of hacking activities in Q4.
"The popularity of the Mirai botnet and similar IoT vulnerabilities gave hackers ample ammo to overwhelm security and operations in Q4," said Juniman Kasman, CTO for Nexusguard. "Malicious actors will continue to invent new attacks and blend them with multiple factors for maximum impact, forcing companies to rely on big data and intelligence-driven mitigation, and develop strategic response teams that can quickly handle new threats."
Nexusguard analysts found China and the US were most vulnerable to IoT botnets, with 116,000 and 41,200 IoT botnets recorded respectively. While hackers continue to switch tactics to confuse cybersecurity teams, 97.5% of DDoS attacks used NTP vulnerabilities, the most popular DDoS attack method, in 2H16.
Researchers predict IoT botnets will continue to pose major cybersecurity challenges in 2017, causing more volumetric attacks at higher frequencies.
Nexusguard recommends organisations evaluate in-house capabilities alongside outsourced bandwidth to ensure support teams can analyse incidents and recommend solutions in a timely fashion.
Interested?
Read the Q4 2016 Threat Report
posted from Bloggeroid
No comments:
Post a Comment