IT News — Nineteen distributed denial-of-service (DDoS) attacks exceeded 100 Gbps during the first three months of the year, hitting a new record, according to researchers from Akamai. The year prior, just eight attacks were over 100 gigabit per second, the firm said.
Networks Asia — For the past few years, India and its IT teams have been in a constant state of war with malware, hackers, insidious employees and everything that is a threat to their information security. The only strategy applied, and it wasn’t an effective one, was to deal with the after-effects of the attack. But one CIO believed in the age old adage: Prevention is better than cure, and secured the most critical applications of the company from DDOS attacks.
IT News — An unknown group of criminals have been successful in extorting Cloudflare customers out of hundreds of thousands of dollars simply by threatening denial of service attacks, but never actually executing one. Cloudflare’s founder and chief executive Matthew Prince revealed that over a hundred Cloudflare customers had received emails from the “Armada Collective” demanding “protection fees” of 10 to 50 Bitcoin (A$6000 – A$30,000) over the past two months.
Datacenter Dynamics — Singapore-based Internet service provider (ISP) ViewQwest has launched a DDoS (Distributed Denial-of-Service) protection service that it says is the most affordable in the country. A DDoS protection service is designed to defend organizations from debilitating attacks against their websites and Internet-facing services.
Enterprise Innovation — Businesses do not need to have external interfaces such as public websites, customer portals and transactional systems to be affected by a DDoS (Distributed Denial of Service) attack, accoring to Kasperskly lab and BSB International. New research from the two companies show that internal web services, operations and connectivity are just as vulnerable. This especially hits manufacturing companies.
IT News — US anti-distributed denial of service firm Staminus has suffered a comprehensive attack that saw its systems taken offline and sensitive customer data posted on the internet. Staminus, which counts white supremacist group the Ku Klux Klan as a customer, this weekend had its company information posted on a paste website, with attackers disseminating a 15GB database on the anonymising TOR network.
Channel News Asia — LONDON: HSBC is working with law enforcement to catch those behind a cyber attack that forced its personal banking websites in the UK to shutdown, its second major service outage this month, the bank said on Friday. Europe’s largest lender said it had “successfully defended” its systems against a distributed denial of service (DDoS) attack but it was experiencing fresh threats, impeding full restoration of its services.
The fourth quarter of 2015 was marked by a decrease in the number of countries where resources are targeted, as well as by new attack channels used by cybercriminals to disable resources, according to Kaspersky Lab’s latest DDOS Intelligence Report.
Business Wire — SANTA CLARA, Calif: NSFOCUS IB today announced that NSFOCUS Anti-DDoS System (ADS) has been used to mitigate a sustained, 90-Gbps Distributed Denial of Services (DDoS) attack against Australian service provider Micron21, which offers mission-critical data center capabilities to clients around the world.
Networks Asia — Information security threats will continue to escalate in 2016, but improved awareness and more investment by enterprises can do much to mitigate the increased risk. Where should business focus their efforts and attention? And what organizations will be most at risk in the coming year? Here are some predictions on what to expect in the cyber security space in 2016:
Times of India — MUMBAI:In July, two of the country’s biggest banks started getting complaints that their customers were unable to access any online services. An hour later, it was discovered that professional cybercriminals had launched DDOS (distributed denial of services) attacks from servers traced to Pakistan. In this case, the banks were able to wrest back control of their servers using professional help without having to pay any ransom.
Australia has appeared in content delivery network provider Akamai’s top ten list of sources for denial of service attacks for the first time, as high-speed broadband connections become more commonplace. Akamai’s State of the Internet report saw Australia enter the top ten DDoS source list in the second quarter of this year with around four percent of attacks globally, putting it on par with larger countries such as Germany, Russia and Korea.
Vietnam Net — The trouble occurred at 2.30 pm on July 22, the time when MOET (Ministry of Education and Training) began making public the national high school finals’ results. The ministry’s website was accessible but no action could be taken because of millions of people were trying to access the site. The ministry’s website was designed for 60,000 simultaneous visitors only. MOET later tried to fix the problem by sharing the database with some universities to balance the load.
IT News — iiNet broadband customers in New South Wales had a rough ride over the weekend, facing long service interruptions as their internet provider struggled to mitigate against a large distributed denial of service (DDoS) attack. One iiNet representative explained on Saturday via the Whirlpool broadband user forum that the outages were “due to a large volume of external traffic directed towards iiNet Group service”.
Australia has been spared the worst of a significant increase in attacks on internet-connected systems highlighted in content delivery giant Akamai’s latest state of the internet security report. The country is the second most common destination in the world for web application attacks, Akamai’s figures show. However, the overall threat against Australian sites is very small at 2.27 percent of all attack traffic. United States-based websites are overwhelmingly the most attacked at 81.6 percent of attack traffic, Akamai noted.
The massive denial-of-service attacks that have intermittently shut down GitHub for more than five days is the work of hackers with control over China’s Internet backbone, according to two technical reports published Tuesday that build a strong case that government authorities are at least indirectly responsible. GitHub officials have said the torrent of junk data pummeling their servers is the biggest they have ever seen.
An activist group working to end China’s Internet censorship is facing an ongoing distributed denial of service (DDoS) attack that threatens to cripples its activities. GreatFire.org, a censorship watchdog based within the country, reported on Thursday that it had been hit with its first ever DDoS attack. Although it’s not known who is behind the attack, China has been suspected of using the tactic before to take down activist websites.
Greatfire.org, the outspoken activist website that openly fights against web censorship in China, reported yesterday it is under a distributed denial of service (DDoS) attack. Greatfire representative Charlie Smith (a psuedonym) says the attack began shortly after the website was cited in a Wall Street Journal article describing tactics used to circumvent China’s censors and make mirrors of blocked websites accessible from the mainland.
WASHINGTON: A US-subsidized advocacy group that helps internet users inside China bypass blockages on censored content says it is suffering a mysterious denial-of-service attack disrupting its operations. Greatfire.org says the attack started two days ago and internet traffic is 2,500 times above normal. It says the attack has affected “mirror,” or duplicate, websites that it has set up via encrypted web services offered by companies like Amazon.
Distributed Denial of Service (DDoS) attacks are designed to knock websites, applications, services and businesses offline. They are the modern day equivalent of besieging premises with a mob intent on allowing nobody in or out. While some may think that they are just an inconvenience they are now a major tool in the cyber criminals arsenal. It is not just the criminal fraternity using them. Hacktivists and even competitors are using them to cause significant damage to companies.
Millions of Vietnamese could not access google.com.vn on noon at February 23. Instead of the interface for information search, they saw an image of a young man who seemed to show off his iPhone, and the notice that the website had been hacked by Lizard Squad. Lizard Squad is a black-hat hacking group, known for its claims of distributed denial-of-service (DDoS) attacks to disrupt services related to gaming.
The simplest explanation for North Korea’s suddenly dropping off the Internet was a distributed denial-of-service (DDoS) attack that overwhelmed the isolated nation’s tenuous connection to the rest of the world, experts said Monday. North Korea’s Internet connection went down around 11 a.m. ET on 22 December 2014, and was restored about nine and a half hours later, at approximately 8:45 p.m. ET. But within hours, some sites checked by Computerworld, including North Korea’s official news agency, were again offline.
If you got a PlayStation 4 for Christmas but network outages spoiled your fun, Sony wants to make it up to you. Sony Computer Entertainment America will offer 10 percent off PlayStation Store purchases including games, TV shows and movies as a gesture of thanks for users’ patience following an outage of several days caused by denial-of-service (DDoS) attacks.
Akamai Technologies has opened a new data center in Japan as part of an on-going expansion of its global network to fight distributed denial of service (DDoS) attacks. DDoS attacks are designed to render websites unavailable either by an overwhelming flood of fake requests, or with the use of malicious requests which exploit legacy protocols and programming weaknesses.
BEIJING, Dec. 10, 2014 /PRNewswire/ — Huawei today signed a Memorandum of Understanding (MoU) with Black Lotus, a leading Distributed Denial of Service (DDoS) protection service provider to provide enterprises with professional and efficient anti-DDoS products and services that address the challenges of new DDoS attack types. The partnership will focus on research and development (R&D) in cyber defense technology and marketing.
BANGALORE, INDIA: According to a new global research from security experts at Symantec, India topped the global top 50 ranking of countries that have witnessed the highest volume of ‘originating DDoS traffic’, with 26 percent of all DDoS traffic originating from the country, followed by the USA with 17 percent.
NEW DELHI: India has emerged as the top destination for origination of distributed denial of service (DDoS) cyber attacks, accounting for 26 per cent of such attacks on gaming, software and media sectors, security solutions firm Symantec today said. Cyber criminals use DDoS attacks to disrupt sites by bombarding them with traffic from multiple sources, resulting in online service becoming unavailable for a period of time. Other countries in the list include the US (17 per cent), Singapore, Vietnam and China.
BEIJING: Anonymous, the nebulous online activist group that uses hacking to further causes it supports, has threatened a major blackout of Chinese and Hong Kong government websites, and to leak tens of thousands of government email address details. The group, under the banner of ‘Operation Hong Kong’ or ‘#OpHongKong’ and ‘#OpHK’ on Twitter, said on Friday it will launch a mass effort against Chinese government servers to bring down their websites via Distributed Denial of Service (DDoS) attacks on Saturday.
Akamai’s Prolexic division has warned of the growing threat from a Chinese toolkit that has started infecting Linux, Windows and embedded systems in order to launch DDoS attacks peaking at hundreds of Gigabits per second. Dubbed the ‘Spike’ toolkit, the malware started life targeting Linux servers earlier in 2014 but now seems to have been ported to run on Windows (both PCs and servers), consumer and SME routers, and even Internet of Things (IoT) devices such as thermostats.
VANCOUVER — DOSarrest Internet Security announced today that they have expanded their DDoS protection cloud into Asia, with a new DDoS mitigation node in Singapore. The new node will work in conjunction with their existing nodes in New York, Los Angeles and London and will have the same connectivity as the others, including multiple 10 Gb/Sec uplinks to multiple carriers. Jag Bains, CTO at DOSarrest states “Having a presence in Asia allows our existing client base to cache and serve traffic closer to Asian visitors for increased performance as well as enabling us to provide excellent web performance and DDoS protection to customer’s servers located in Asia.”