Black Friday weekend was DDoS attack weekend

B2B Cyber ​​Security ShortNews

Share post

Cyber ​​attacks on Black Friday weekend broke records and were twice as high as last year. The companies were faced with a flood of DDoS attacks that have now exceeded the terabit limit.

The past Cyber ​​Weekend not only attracted bargain hunters to the Internet. The latest evaluations by the IT security provider Link11 show that cyber criminals also tried to seize the opportunity. According to evaluations by the Link11 Security Operations Center (LSOC), they covered companies with DDoS attacks in order to damage them or to extort bitcoins. However, the number of attacks this year was even higher than expected and the surprising force of the attacks also set alarming records.

Massive DDoS attacks on Black Friday and Cyber ​​Monday

During the entire cyber weekend, the LSOC registered increased DDoS attack activity in its global network. However, the perpetrators attacked particularly frequently on Black Friday and Cyber ​​Monday. Here the increase in the number of DDoS attacks was over 200% compared to the previous year. In addition to e-commerce providers, payment service providers and logistics companies, the attackers also targeted hosting and cloud providers as well as ISPs who provide the digital infrastructure for online business.

Record-breaking attack bandwidths

For applications, online services and networks that generally have high load peaks, even relatively small DDoS attacks are enough to cause overload. In order to conserve their resources, the attackers therefore usually refrain from oversized attacks and choose their attacks as small as necessary. However, on the cyber weekend, the LSOC posted a bandwidth record of 1,1 Tbps. The attack volume of the botnet attack, which targeted a hosting provider in Germany on Sunday, was generated solely via a UDP flood. If the perpetrators had also used amplifier techniques such as DNS or CLDAP reflection amplification, the attack volume would have been significantly higher. The so-called amplification factor for these very frequently used DDoS vectors is 54 for DNA and up to 70 for CLDAP.

The record attack was accompanied by numerous hyper attacks. In 20 other attacks over the cyber weekend, bandwidth peaks of over 100 Gbps were registered. If you want to profit from the sales peaks in online retail in a fail-safe manner, it is best to invest in scalable, cloud-based protection solutions that can withstand attacks in the terabit range. This means that the focus remains on the core business and the shop team is not additionally burdened by emergency measures.

More at Link11.com

 


Via Link11

Link11 is the leading European IT security provider in the field of cyber resilience, with headquarters in Germany and worldwide locations in Europe, North America, Asia and the Middle East. The cloud-based security services are fully automated, react in real time and repel all attacks, both known and new patterns, guaranteed in less than 10 seconds. According to the unanimous opinion of analysts (Gartner, Forrester), Link11 thus offers the fastest detection and defense (TTM) available on the market. The Federal Office for Information Security (BSI) identifies Link11 as a qualified DDoS protection provider for critical infrastructures. To ensure cyber resilience, web and infrastructure DDoS protection, bot management, zero-touch WAF and even secure CDN services ensure holistic and cross-platform hardening of networks and critical applications in companies.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more