Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 26 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

In the DDoS-for-hire business, customer service matters

by The Gurus
April 7, 2017
in This Week's Gurus
Share on FacebookShare on Twitter

You’re probably enrolled in an airline’s rewards programme, receiving points or miles to use toward free flights. The more you fly, the more points you get. It’s a way to recognise customer loyalty.
Every type of business wants to build a loyal customer base. Even the cyber criminals who run DDoS-for-hire services.
DDoS Loyalty Programs
As the DDoS-for-hire racket evolves, some such services have started offering repeat customers points and discounts toward future purchases. It’s a sort of DDoS loyalty programme, according to a new report by Kaspersky Labs that digs deeper into the DDoS-for-hire market and the cost of attacks.
“Some developers even offer bonus points for each attack conducted using their service. In other words, cybercriminals have their own loyalty and customer service programs,” the report notes, adding that most DDoS attacks are ordered through full-fledged Web services, which removes the need for direct contact between the two parties.
Customers use these Web services to register for an account, make payments, manage their balance and attack budget, access reports and more. Kaspersky compared them to Web services offered by legal services. In the DDoS-for-hire business, many of these Web services boast thousands to hundreds of thousands of registered users.
IoT-based Attacks Are Cheaper
According to the report, the cost of a DDoS attack fluctuates based on the target, the duration of the attack and the geographic location of the target. According to research, a DDoS attack can cost anywhere from £3 for a 300-second attack to £300 for 24 hours, and the average price for an attack is around £20 per hour.
The price of a DDoS attack also takes into consideration the attack’s generation and the source of attack traffic. For example, an attack leveraging a botnet made up of Internet of Things (IoT) devices costs less than an attack that uses a botnet made up of servers.
“At the same time, cybercriminals continue to actively seek new and cheaper ways to organise botnets,” the Kaspersky report states. “In this regard, the Internet of Things makes life easier for them. One of the current trends is the infection of IoT devices (CCTV cameras, DVR-systems, ‘smart’ household appliances, etc.) and their subsequent use in DDoS attacks. And while vulnerable IoT devices exist, cybercriminals are able to exploit them.”
Dawn of the DDoS of Things
The rise of DDoS-for-hire services comes on the heels of a spate of high-profile DDoS attacks that reached unprecedented volume, size and scope. For the first time on record, DDoS attacks have exceeded the 1 Tbps threshold, an upward swing that is expected to continue.
The Mirai malware is powering this tsunami of DDoS attacks, which takes advantage of unsecured IoT devices to build massive botnets and launch mammoth DDoS attacks. The uptick in DDoS activity has ushered in the DDoS of Things (DoT) era, where threat actors use unsecured IoT devices to build the botnets that drive colossal DDoS attacks.
According to our new DDoS of Things infographic, there are now roughly 3,700 DDoS attacks per day, and once a business is attacked there’s an 82 per cent chance they’ll be attacked again.
DDoS Defence
For service providers, enterprises and security-conscious businesses, it is necessary to implement DDoS protection solutions to detect, mitigate volumetric, multi-vector DDoS attacks at the network edge. This needs to be the first line of defence for network infrastructure to help helps prevent IoT-powered DDoS attacks and protect your business from the DDoS of Things.

FacebookTweetLinkedIn
Tags: BusinessCyberDDoSsecurityTechnology
ShareTweet
Previous Post

New survey shows 78% of eCommerce websites at risk

Next Post

Sathurbot Trojan Targets WordPress Sites Using Illegal Movie and Software Torrents

Recent News

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

September 25, 2023
Nurturing Our Cyber Talent

Nurturing Our Cyber Talent

September 25, 2023
The Journey to Secure Access Service Edge (SASE)

The Journey to Secure Access Service Edge (SASE)

September 22, 2023
WatchGuard

WatchGuard acquires CyGlass for AI-powered network anomaly detection

September 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information