sb-nz logo
Story image

Millions of DDoS attacks hit Asia Pacific in 2017

25 Jan 2018

Automation and managed services may be the key mechanisms for fighting distributed denial of service (DDoS) attacks, according to new findings from NETSCOUT Arbor

The 13th Annual Worldwide Infrastructure Security Report (WISR) confirms the prevalence and scale of DDoS attacks, particularly against service providers and enterprises.

There were 7.5 million attacks across Arbor’s ATLAS infrastructure, which makes up one third of global internet traffic. The biggest attack reported by a service provider reached 600 Gbps, slightly lower than an 800 Gbps attack reported in 2016.

NETSCOUT Arbor chief technology officer Darren Anstee says attackers shifted their focus away from huge attack volumes and instead focused on complexity to leverage IoT device weaponisation.

“Attackers have been effective, and the proportion of enterprises experiencing revenue loss due to DDoS nearly doubled this year, emphasising the significance of the DDoS threat.”

57% of enterprise and 45% of data centre operators also experienced saturated bandwidth due to DDoS attacks.

Multi-vector DDoS attacks increased 20% since 2016. 59% of service providers and 48% of enterprises experienced these complex attacks, which use a mix of high-volume floods, application-layer attacks and TCP-state exhaustion attacks in a single blow. These increase the attacker’s chance of success and make it more difficult for organisations to defend against them.

88% of service providers use say they use intelligent DDoS mitigation solutions – 36% use automated DDoS mitigation.

Managed service providers are also in hot demand: 38% of enterprises rely on third party and outsources services, a 38% increase since 2016.

2.25 million attacks against APAC 

2,253,265 DDoS attacks hit Asia Pacific organisations last year. The biggest attack reached 622 Gbps and occurred between August 1 and 2. The biggest packets per second (PPS) attack reached 287 Mbps, which occurred at around the same time.

Korea was the source of many DDoS attacks (45.63%), followed by the United States (40.8%), China (32%) and Japan (25.31%).

Australian organisations experienced 131,700 attacks. The largest attack occurred in June and reached 228 Gbps. The largest PPS attack reached 39.9 Mbps in September.

The top four source attack countries include the United States (29.43%), China (25.18%), the United Kingdom (23.05%) and Russia (22.34%).

New Zealand organisations experienced 31,373 DDoS attacks in 2017. One of the biggest attacks occurred between August 2 and 3. It reached 62 Gbps. There were similar spikes between August 5-6 and 7-8, reaching between 50 and 60 Gbps.

The largest PPS attack occurred on August 12, which reached 24 Mbps.

Of the attacks against New Zealand, 85.5% seemed to originate from the United States. 61.35% were from China, 54.99% from Great Britain and 54.92% from the Netherlands.

The challenges for security teams

According to the report, network and security teams face challenges including staff shortages and active threat landscape.

“The results of the WISR survey, together with our ATLAS data, demonstrate why an integrated multi-layer defence from the data centre to the cloud is required,” Anstee concludes.

Additional facts and figures:

  • The top three DDoS attack motivations are online gaming; criminals showing off their attack capabilities; and extortion
  • 57% cited reputation/brand damage as the main business impact, with operational expenses second
  • 56%  experienced a financial impact between $10,000 and $100,000, almost double the proportion from 2016
  • 48% of data centre operators said customer churn was a key concern following a successful attack
  • The survey respondents comprised 55% service providers and 45% in enterprise, government and education.
Story image
BlackBerry, Microsoft enter partnership for Teams integration
"Integrating BlackBerry AtHoc will ensure that any organisation managing critical events using Teams is able to contact, alert, and account for everyone within the organisation directly."More
Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More
Story image
BlackBerry partners with ServiceNow for incident response management
BlackBerry has announced it has entered into a partnership with ServiceNow to integrate the BlackBerry AtHoc service within the Now platform for rapid crisis communications and IT service management. More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Link image
How to head off a rise in DDoS attacks
Many businesses invest in costly DDoS mitigation and protection solutions, but few test them. NCC Group tests all environments and is one of only two AWS DDoS Test Partners. Claim 10% off your next DDoS service today.More
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More