Blog

Hackers Are Using DDOS Attacks To Profit Off Businesses

Feb 6, 2021 | Blog

Distributed Denial of Service Attacks (DDOS) have been used by hackers since the earliest days of the web.

Get enough internet-connected devices to ping a server at the same time, and you can knock the server offline.

Keep the pressure on and you can keep it offline, pretty much indefinitely.

These days, given the web’s importance, that can easily bring financial ruin to all but the most deep-pocketed companies. Hackers know this of course, which is why such attacks are still in use to this very day.

Recently though, there’s been a notable surge in their use, and not only that, hackers have begun changing the way they use this form of attack. Specifically, they’ll threaten to perform a sustained DDOS attack against a target company unless that company pays them a fee to go away. This is a marked departure from the way DDOS attacks have been used in the past, and makes it much more similar to a ransomware attack. They simply issue the threat and wait to see if they get paid.

According to statistics gathered by researchers at Neustar, DDOS attacks increased by a staggering 154 percent between 2019 and 2020 and there’s no sign that the surge is slowing down. Now add in the new wrinkle of threatening to hit a company with such an attack, and the scope and scale of the threat resolves into stark clarity.

It’s easy to see why this is an increasingly popular option for hackers around the world. Of all the types of attacks available to hackers, the DDOS option is the simplest and most straightforward. Literally anybody with access to a botnet can do it. Given the massive size of some of the botnets available for hire on the Dark Web, it’s not hard to understand why an increasing percentage of companies are choosing to pay rather than run the risk of being shut down.

Nustar’s Vice President of Security Product Management Michael Kaczmarek, however, advises against simply paying the toll.

He writes:

“Organizations should avoid paying these ransoms. Instead, any attack should be reported to the nearest law enforcement field office, as the information may help identify the attackers and ultimately hold them accountable. Beyond this, organizations can prepare by setting up a robust DDOS mitigation strategy, including assessing the risks, evaluating available solutions, considering mitigation strategies, and keeping their plan and provider up to date.”

Although the threat is very real, there’s actually a lot a company can do to ward off such an attack, and paying the toll only emboldens future threats. The best way forward is to see these criminals held to account. Don’t pay. Make them pay.

FBI Program Tasked with Infrastructure Security Compromised

FBI Program Tasked with Infrastructure Security Compromised

The FBI program tasked with ensuring critical infrastructure security has been compromised by hackers, who now offer access to the program's data on the dark web. The breach was initially disclosed by Brian Krebs of Krebs on Security, who claims that the data was for...

Streamline Your Business with the Latest Smart Home Technology

Streamline Your Business with the Latest Smart Home Technology

Are you a business owner looking to get the most out of your Google smart home devices? If so, you're in luck! Google has enabled its Nest products and Android OS with the initial rollout of the Matter smart home standard. This means that businesses now have the...

Data Breach at Sequoia One Exposes Sensitive Customer Information

Data Breach at Sequoia One Exposes Sensitive Customer Information

What do you do when your most personal information has been compromised? This is likely the question that customers of Sequoia One asked themselves earlier this month as they were informed that the company had been hacked. Sequoia One specializes in the management of...

Cisco Reports Critical IP Phone Vulnerability

Cisco Reports Critical IP Phone Vulnerability

As a business owner, it's important to stay informed about potential vulnerabilities that could impact your organization. Recently, Cisco reported a critical vulnerability, tracked as CVE-2022-20968, affecting its IP Phone 7800 and 8800 Series. This new vulnerability...

Google Chrome Releases Two New Features

Google Chrome Releases Two New Features

Google Chrome is one of the more commonly used web browsers. Over the years, though, Chrome has gained a reputation for utilizing a large portion of a computer's memory. This can be a problem if you're running other resource-intensive tasks and don't want to slow...

Get a Free Consultation

 

Fill out the form below to receive a free consultation and learn how we can make your technology worry-free!

 

Contact Information

  • 39301 Badger Street, Suite 500
    Palm Desert, CA 9221
  • (760) 333-8523
  • info@icn.tech