- Distributed Denial of Service (DDoS) attacks have evolved and become more frequent.
- This is particularly true for Q1 2020, which, according to a Kaspersky report, saw a significant increase in DDoS attacks, both in quantity and quality.
Distributed Denial of Service (DDoS) attacks have evolved and become more frequent. This is particularly true for Q1 2020, which, according to a Kaspersky report, saw a significant increase in DDoS attacks, both in quantity and quality.
The sharp rise has seen educational platforms, medical organizations, delivery services, and gaming websites targeted by attackers. The pandemic has also left its mark on cryptocurrencies with OKEx and Bitfinex suffering DDoS attacks and consequently dealing with system overloads on their servers.
Although it is typical for the first quarter of every year to experience a rise in DDoS attacks, rates have surged by 50% in comparison to Q4 of 2019. Since this time last year, DDoS attacks have risen by as much as 80%.
According to the Organisation for Economic Co-operation and Development,
“Cybercriminals are counting on the likelihood that individuals and organisations will more easily fall for scams or pay ransoms in periods of stress and crisis, in particular those who lack good digital security practices or face organisational disruptions. However, as their attack techniques and malicious code are not new, the application of basic digital security “hygiene” is an effective way to mitigate these attacks.”
How Long Will DDoS Last?
One of the most notable attacks that occurred during the coronavirus lockdown targeted the US Department of Health and Human Services. In an attempt to weigh down the servers, the attack lasted several hours. This comes with another trend recorded by Kaspersky in Q1 2020, which shows that attacks have increased in duration by 25%.
“Outage of internet services can be especially challenging for businesses now, because this is often the only way to make goods and services available to their customers. In addition, widespread adoption of remote working opens new vectors for those responsible for carrying out DDoS attacks. Previously most attacks were conducted against the public-facing resources of companies.
We now see that DDoS attacks target internal infrastructure elements, for example, corporate VPN gateways or email servers,” says Alexey Kiselev, business development manager on the Kaspersky DDoS Protection team.
The Shift In DDoS Attacks
Those most targeted by cybercriminals, according to Kaspersky, include government agencies, administrative domains, educational systems, as well as shopping platforms. Users are increasingly relying on COVID-19 guidance sources, home-working tools, and e-commerce websites, consequently making those tools and platforms more at risk.