Akamai Technologies. Inc. have announced availability of the Prolexic Q2 201 4 Global DDoS Attack Report. Prolexic Technologies, now part of Akamai, is a recognised leader in Distributed Denial of Service (DDoS) protection services, and has produced the quarterly Global DDoS Attack Report since 201 I. The report, which provides analysis and insight into the global DDoS threat landscape, can be downloaded at www.prolexic.com/attackreports.
"DDoS attacks have continued in high numbers and with high average and peak bandwidths. They can take out an entire data center by overwhelming network bandwidth," said Stuart Scholly, senior vice president and general manager of Security at Akamai Technologies. "Behind these powerful attacks are changing tactics to build, deploy and conceal powerful botnets. Server-side botnets are preying on web vulnerabilities and reflection and amplification tactics are allowing attackers to do more with less."
When building server-side botnets, attackers have been targeting Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) vendors with server instances running software with known vulnerabilities, such as versions of the Linux, Apache, MySQL, PHP (LAMP) stack and Microsoft Windows server operating systems. They have also targeted vulnerable versions of common web Content Management Systems (CMS) such as WordPress and Joomla or their plugins.
While the use of server-based botnets has increased, the itsoknoproblembro (Brobot) botnet, also based on server infection, has remained a threat. Attacks in the second quarter of 201 4 provided indications that the botnet is still in place from its earlier use in the Operation Ababil attacks against financial institutions in 2011-2013. Once thought to have been cleaned up, it appears the botnet has been surreptitiously maintained.
Reflection and amplification attacks were more popular in the second quarter of 2014 as compared to the same period in 2013, representing more than 15 percent of all infrastructure attacks. These attacks take advantage of the functionality of common Internet protocols and misconfigured servers. While the use of NTP reflection attacks...