Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 16 May, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

The dawn of the DDoS of Things (DoT)

by The Gurus
March 21, 2017
in This Week's Gurus
Share on FacebookShare on Twitter

Last year saw an unprecedented uptick in the volume, size and scope of distributed denial of service (DDoS) attacks.
Led mostly by the Mirai malware, this drumfire of DDoS attacks took advantage of unsecured Internet of Things (IoT) devices to build massive botnets and launch mammoth DDoS attacks, the likes of which the industry had never seen. For the first time, DDoS attacks exceeded the 1 Tbps threshold. And Mirai is still making waves.
In his keynote presentation at RSA Conference 2017, Intel Security Senior Vice President and General Manager Christopher Young warned that Mirai is thriving. “We can’t think of the Mirai botnet in the past tense. It’s alive and well today, and recruiting new players,” he said.
Researchers suggested Mirai was just the beginning. Making public the code needed to launch an IoT-powered botnet was a first salvo. A rival botnet malware, Leet, quickly followed on the heels of Mirai and used SYN payloads different than Mirai. And in 2017, there’s sure to be another chapter in this saga.
Welcome to the DDoS of Things
 This is the era of the DDoS of Things (DoT), where bad actors use IoT devices to build botnets which fuel colossal DDoS attacks. The DoT is reaching critical mass — recent attacks have leveraged hundreds of thousands of IoT devices to attack everything from large service providers and enterprises to gaming services, media and entertainment companies. And it’s estimated that there will be 24 billion connected IoT devices by 2020.
As an attack method, it’s now even easier for attackers to commandeer IoT devices for nefarious purposes. Many devices still use unsecure default credentials and are ripe for the picking. Basic instructions are available online and the lucrative DDoS-for-hire market is expanding.
The DDoS of Things is powering bigger, smarter and more devastating multi-vector attacks than ever imagined. This increased activity has lead Deloitte Global to predict that attacks reaching or exceeding 1 Tbps or more will be commonplace in 2017. Deloitte posits that there will be an average of one 1 Tbps attack or larger per month this year, as the total number of DDoS attacks surpasses 10 million globally.
Need more proof? This DDoS of Things Infographic has numbers that are as startling as they are informative. For example, there are roughly 3,700 DDoS attacks per day, and the cost to an organisation can range anywhere from £10,000 to £2 million per incident. And once a business is attacked, there’s an 82 percent change they’ll be attacked again.
Is your business prepared to battle the influx of IoT-driven DDoS attacks?
Don’t Let the DDoS of Things Take You Down
 DDoS attacks are damaging. Along with service disruption, they have a lasting impact that harms your brand, your revenue and your user experience. You need to fight back.
A10 Thunder TPS can help mitigate DoT attacks. Thunder TPS is a line of high-performance solutions that detect and mitigate multi-vector DDoS attacks at the network edge. Thunder TPS can mitigate DDoS attacks up to 300 Gbps, and up to 2.4 Tbps in a synchronised cluster — meaning you can battle the DoT without breaking a sweat.
A10 Thunder TPS is agile, efficient and battle-tested. It’s your best defense against the DoT.
 Check out A10 Networks DDoS of Things Infographic
By Dr Chase Cunningham, Director of Cyber Operations, A10 Networks

FacebookTweetLinkedIn
Tags: botnetsCyberDDoSIoTMalwareTechnology
ShareTweetShare
Previous Post

63% of enterprises using cloud, big data, IoT and container environments without securing sensitive data

Next Post

Ixia’s security report shows organizations still vulnerable to brute force attacks

Recent News

eu flag

EU announces provisional cybersecurity directive

May 16, 2022
man looking sad

Security pros say their mental health has declined

May 13, 2022
@ symbol

NCSC launches free email security check

May 12, 2022
warning colours

Five Eyes urges organisations to secure supply chains

May 12, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information