SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Q4 2013 DDoS Attack Spotlight: Multi-Vector Campaigns
Selected excerpts
Prolexic recently released the Q4 2013 Global Attack Report, which spotlights the following multivector distributed denial of service (DDoS) attack campaign against a global financial firm. This
DDoS campaign is a good example of how sophisticated malicious actors use a multi-pronged
approach to create attacks that are more difficult to stop and use every device at their disposal,
including mobile phones.
Multi-vector DDoS attack campaigns make DDoS mitigation more difficult. Multiple attack vectors
make it less likely the attack can be blocked with automated devices. In addition, the DDoS
mitigation team has to track more details and to fight the attack on multiple fronts simultaneously.
In this case, the attacks continued for four days, during which time Prolexic DDoS mitigation
experts monitored and responded to the attack in real-time day and night. Every time the attack
changed, the Prolexic DDoS mitigation engineers crafted a response to block the attack. In an
emerging trend seen in other recent DDoS attacks, mobile phones played a pivotal role in boosting
the strength of the attack.
The attack campaign spanned the globe, with Asian botnets playing a large role. The malicious
actors used botnets in Indonesia, China, U.S. and Mexico. The source was hidden behind a super
proxy – an IP address that acts as an intermediary for tens of thousands of other computer
systems. To avoid blocking traffic from legitimate users of the super proxy, the DDoS mitigation
team at Prolexic had to use advanced mitigation technologies to isolate the malicious network
traffic from legitimate traffic.
The campaign comprised at least 12 different attacks, some of which attempted to take down the
target by overwhelming the network layer (Layer 3) while others struck via the application layer
(Layer 7). The attack signatures indicated the malicious actors recruited voluntary and
involuntary participants in the botnet. In addition, unwitting domain name servers were
victimized via spoofing to launch distributed reflection denial of service (DrDoS) attacks against
the target.
Volunteers opted into the botnet with Low Orbit Ion Cannon
Botnets are usually formed when servers and personal computers are infected with a Trojan virus
or other malware that cause them to become unwitting participants in a DDoS botnet. Low Orbit
Ion Cannon, also known as LOIC, is a DDoS tool that takes a different approach. LOIC lets
supporters lend their computing resources by opting into a campaign. To become part of the
botnet, a participant simply downloads the tool and voluntarily connects to the attacker’s
command and control server. Once connected, the members of the Anonymous cooperative who
lead an attack can control the participating devices remotely via Internet relay chat (IRC) or a URL
shortening service, such as Bit.ly.
Apps for DDoS attacks
The Prolexic Security Engineering and Response Team (PLXsert), which analyzes DDoS attacks
globally, has observed an increasing use of mobile devices in DDoS campaigns, including this one.
This DDoS trend is most notable in markets such as Asia where the main means of access to the
Internet is a mobile phone.
Attack signatures matching AnDOSid, a DDoS attack tool for Android devices, and mobile LOIC
(Low Orbit Ion Cannon), a new Android app that was available from the official Google Play
appstore in December 2013, were observed during the campaign. PLXsert expects a significant
increase in the number of mobile devices participating in future DDoS campaigns as the
availability and adoption of these tools becomes widespread.
Get the full Q4 2013 Global Attack Report with all the details
Each quarter Prolexic produces a quarterly DDoS attack report. As the world’s leading DDoS
mitigation provider, Prolexic is ideally positioned to collect valuable data on the origins, tactics,
types, and targets of DDoS attacks and identify emerging trends. Download the Q4 2013 Global
Attack Report for:
● More details about this attack
● Attack signatures used
● Global DDoS attack trends
● Year-over-year and quarter-by-quarter comparisons
● Types of attacks used
● Network protocols at risk for abuse by attackers
● Industries targeted
● Details about real attacks mitigated by Prolexic
● Case study about the Asian DDoS threat
The more you know about DDoS attacks, the better you can protect your network against
cybercrime. Download the free Q4 2013 Global Attack Report today.
About Prolexic
Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and
mitigation services. Learn more at http://www.prolexic.com.

Weitere ähnliche Inhalte

Andere mochten auch

Bett2013 mobiluck finland_js (1)
Bett2013 mobiluck finland_js (1)Bett2013 mobiluck finland_js (1)
Bett2013 mobiluck finland_js (1)
Muuramen lukio
 
General planning strategy 2 powerpoint presentation slides.
General planning strategy 2 powerpoint presentation slides.General planning strategy 2 powerpoint presentation slides.
General planning strategy 2 powerpoint presentation slides.
SlideTeam.net
 
Egr slide cast rough
Egr slide cast roughEgr slide cast rough
Egr slide cast rough
ajc03
 
PGNA 2014: High School
PGNA 2014: High SchoolPGNA 2014: High School
PGNA 2014: High School
Laura Jacob
 
Wayne Resa Collaboration
Wayne Resa CollaborationWayne Resa Collaboration
Wayne Resa Collaboration
cwozniak
 
Yeast daeunkimchekc
Yeast daeunkimchekcYeast daeunkimchekc
Yeast daeunkimchekc
s08051
 
credit-suisse Environmental Report 1997/1998 Short version
credit-suisse Environmental Report 1997/1998 Short versioncredit-suisse Environmental Report 1997/1998 Short version
credit-suisse Environmental Report 1997/1998 Short version
QuarterlyEarningsReports2
 
Assessment cycle and schedule with TaskStream menu
Assessment cycle and schedule with TaskStream menuAssessment cycle and schedule with TaskStream menu
Assessment cycle and schedule with TaskStream menu
trenam
 
Introducing electronic readers, getting started
Introducing electronic readers, getting startedIntroducing electronic readers, getting started
Introducing electronic readers, getting started
janethenley
 

Andere mochten auch (13)

Intro
IntroIntro
Intro
 
Bett2013 mobiluck finland_js (1)
Bett2013 mobiluck finland_js (1)Bett2013 mobiluck finland_js (1)
Bett2013 mobiluck finland_js (1)
 
General planning strategy 2 powerpoint presentation slides.
General planning strategy 2 powerpoint presentation slides.General planning strategy 2 powerpoint presentation slides.
General planning strategy 2 powerpoint presentation slides.
 
Play bill
Play billPlay bill
Play bill
 
Go Salads
Go SaladsGo Salads
Go Salads
 
Egr slide cast rough
Egr slide cast roughEgr slide cast rough
Egr slide cast rough
 
PGNA 2014: High School
PGNA 2014: High SchoolPGNA 2014: High School
PGNA 2014: High School
 
Wayne Resa Collaboration
Wayne Resa CollaborationWayne Resa Collaboration
Wayne Resa Collaboration
 
Yeast daeunkimchekc
Yeast daeunkimchekcYeast daeunkimchekc
Yeast daeunkimchekc
 
credit-suisse Environmental Report 1997/1998 Short version
credit-suisse Environmental Report 1997/1998 Short versioncredit-suisse Environmental Report 1997/1998 Short version
credit-suisse Environmental Report 1997/1998 Short version
 
Assessment cycle and schedule with TaskStream menu
Assessment cycle and schedule with TaskStream menuAssessment cycle and schedule with TaskStream menu
Assessment cycle and schedule with TaskStream menu
 
Introducing electronic readers, getting started
Introducing electronic readers, getting startedIntroducing electronic readers, getting started
Introducing electronic readers, getting started
 
Unit 1: 5 Themes of Geography
Unit 1: 5 Themes of GeographyUnit 1: 5 Themes of Geography
Unit 1: 5 Themes of Geography
 

Kürzlich hochgeladen

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Kürzlich hochgeladen (20)

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 

Prolexic DDoS Attack Report: A Multi-Vector DDoS Attack Spotlight

  • 1. Q4 2013 DDoS Attack Spotlight: Multi-Vector Campaigns Selected excerpts Prolexic recently released the Q4 2013 Global Attack Report, which spotlights the following multivector distributed denial of service (DDoS) attack campaign against a global financial firm. This DDoS campaign is a good example of how sophisticated malicious actors use a multi-pronged approach to create attacks that are more difficult to stop and use every device at their disposal, including mobile phones. Multi-vector DDoS attack campaigns make DDoS mitigation more difficult. Multiple attack vectors make it less likely the attack can be blocked with automated devices. In addition, the DDoS mitigation team has to track more details and to fight the attack on multiple fronts simultaneously. In this case, the attacks continued for four days, during which time Prolexic DDoS mitigation experts monitored and responded to the attack in real-time day and night. Every time the attack changed, the Prolexic DDoS mitigation engineers crafted a response to block the attack. In an emerging trend seen in other recent DDoS attacks, mobile phones played a pivotal role in boosting the strength of the attack. The attack campaign spanned the globe, with Asian botnets playing a large role. The malicious actors used botnets in Indonesia, China, U.S. and Mexico. The source was hidden behind a super proxy – an IP address that acts as an intermediary for tens of thousands of other computer systems. To avoid blocking traffic from legitimate users of the super proxy, the DDoS mitigation team at Prolexic had to use advanced mitigation technologies to isolate the malicious network traffic from legitimate traffic. The campaign comprised at least 12 different attacks, some of which attempted to take down the target by overwhelming the network layer (Layer 3) while others struck via the application layer (Layer 7). The attack signatures indicated the malicious actors recruited voluntary and involuntary participants in the botnet. In addition, unwitting domain name servers were victimized via spoofing to launch distributed reflection denial of service (DrDoS) attacks against the target. Volunteers opted into the botnet with Low Orbit Ion Cannon Botnets are usually formed when servers and personal computers are infected with a Trojan virus or other malware that cause them to become unwitting participants in a DDoS botnet. Low Orbit Ion Cannon, also known as LOIC, is a DDoS tool that takes a different approach. LOIC lets supporters lend their computing resources by opting into a campaign. To become part of the botnet, a participant simply downloads the tool and voluntarily connects to the attacker’s command and control server. Once connected, the members of the Anonymous cooperative who
  • 2. lead an attack can control the participating devices remotely via Internet relay chat (IRC) or a URL shortening service, such as Bit.ly. Apps for DDoS attacks The Prolexic Security Engineering and Response Team (PLXsert), which analyzes DDoS attacks globally, has observed an increasing use of mobile devices in DDoS campaigns, including this one. This DDoS trend is most notable in markets such as Asia where the main means of access to the Internet is a mobile phone. Attack signatures matching AnDOSid, a DDoS attack tool for Android devices, and mobile LOIC (Low Orbit Ion Cannon), a new Android app that was available from the official Google Play appstore in December 2013, were observed during the campaign. PLXsert expects a significant increase in the number of mobile devices participating in future DDoS campaigns as the availability and adoption of these tools becomes widespread. Get the full Q4 2013 Global Attack Report with all the details Each quarter Prolexic produces a quarterly DDoS attack report. As the world’s leading DDoS mitigation provider, Prolexic is ideally positioned to collect valuable data on the origins, tactics, types, and targets of DDoS attacks and identify emerging trends. Download the Q4 2013 Global Attack Report for: ● More details about this attack ● Attack signatures used ● Global DDoS attack trends ● Year-over-year and quarter-by-quarter comparisons ● Types of attacks used ● Network protocols at risk for abuse by attackers ● Industries targeted ● Details about real attacks mitigated by Prolexic ● Case study about the Asian DDoS threat The more you know about DDoS attacks, the better you can protect your network against cybercrime. Download the free Q4 2013 Global Attack Report today. About Prolexic Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services. Learn more at http://www.prolexic.com.