Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Network Security Communications Networking Privacy The Internet News Technology

53% of DDoS Attacks Result In Additional Compromise, Says Neustar (helpnetsecurity.com) 31

Orome1 quotes a report from Help Net Security: DDoS attack volume has remained consistently high and these attacks cause real damage to organizations, according to Neustar. The global response also affirms the prevalent use of DDoS attacks to distract as "smokescreens" in concert with other malicious activities that result in additional compromise, such as viruses and ransomware. The majority of organizations that suffered a DDoS attack (53 percent) also experienced some form of additional compromise. Forty-six percent of breached organizations discovered a virus, malware was activated at 37 percent of breached organizations, and ransomware was encountered at 15 percent of breached organizations. The report adds: "Neustar collected responses from more than 1,000 information security professionals, including CISOs, CSOs and CTOs to determine how DDoS attacks are impacting their organization and how they are mitigating the threat. The overwhelming majority of surveyed organizations (73 percent) suffered a DDoS attack. Eighty-five percent of attacked organizations were attacked more than once and 44 percent were attacked more than five times. Seventy-one percent of organizations took an hour or more to detect a DDoS attack and 72 percent took an additional hour or more to respond to the attack. Forty-nine percent of surveyed organizations would lose $100,000 or more per house of downtime during these attacks. The overwhelming majority of respondents (76 percent) are investing more in DDoS protection than they were a year ago. The majority of respondents (53 percent) are using traditional firewalls, 47 percent are using a cloud service provider and 36 percent are using an on-premise DDoS appliance combined with a DDoS mitigation service (hybrid solution).
This discussion has been archived. No new comments can be posted.

53% of DDoS Attacks Result In Additional Compromise, Says Neustar

Comments Filter:
  • The logic the summary presents is backward. It is not that more than half of DDOS results in penetration attacks, it's that real attacks are covered by DDOS attacks. It's the old "hey, look over here, look over here" while they sneak in the side entry.

    TFA seems to say as much, so it seems like the summary is wrong (I only read what's posted here so maybe TFA is wrong)

  • by quantaman ( 517394 ) on Wednesday October 05, 2016 @09:48PM (#53022077)

    The majority of organizations that suffered a DDoS attack (53 percent) also experienced some form of additional compromise. Forty-six percent of breached organizations discovered a virus, malware was activated at 37 percent of breached organizations, and ransomware was encountered at 15 percent of breached organizations.

    A DDos isn't a breach, and I'm not clear how a DDos would result in additional vulnerabilities unless the victimized organization did something unusual in their attempt to respond to it.

    I could see an attacker using a DDos as a smokescreen to distract the IT dept while they're running their real attack... but more likely I wonder if admins are simply doing an audit because of the DDos and discovering unrelated attacks at a result.

    • The majority of organizations that suffered a DDoS attack (53 percent) also experienced some form of additional compromise. Forty-six percent of breached organizations discovered a virus, malware was activated at 37 percent of breached organizations, and ransomware was encountered at 15 percent of breached organizations.

      A DDos isn't a breach, and I'm not clear how a DDos would result in additional vulnerabilities unless the victimized organization did something unusual in their attempt to respond to it.

      I could see an attacker using a DDos as a smokescreen to distract the IT dept while they're running their real attack... but more likely I wonder if admins are simply doing an audit because of the DDos and discovering unrelated attacks at a result.

      Yes, its a distraction and smoke screen.

      Also, systems under stress tend to become vulnerable to secondary infections, which is why sometimes it is right to take antibiotics when you have flu.

      • by quantaman ( 517394 ) on Wednesday October 05, 2016 @11:56PM (#53022541)

        The majority of organizations that suffered a DDoS attack (53 percent) also experienced some form of additional compromise. Forty-six percent of breached organizations discovered a virus, malware was activated at 37 percent of breached organizations, and ransomware was encountered at 15 percent of breached organizations.

        A DDos isn't a breach, and I'm not clear how a DDos would result in additional vulnerabilities unless the victimized organization did something unusual in their attempt to respond to it.

        I could see an attacker using a DDos as a smokescreen to distract the IT dept while they're running their real attack... but more likely I wonder if admins are simply doing an audit because of the DDos and discovering unrelated attacks at a result.

        Yes, its a distraction and smoke screen.

        Also, systems under stress tend to become vulnerable to secondary infections, which is why sometimes it is right to take antibiotics when you have flu.

        But how? I don't know how complex networks are managed but I'd assume it would run more or less the way it did previously, only slower.

        There are only two real ways I can think of how a DDos would open vulnerabilities. First virus scanners may not be able to reach the systems they're supposed to scan (ie mailserver). And second, the regular secured systems might become inaccessible so people start using insecure workarounds instead.

        • by amacide ( 12270 )

          But how? I don't know how complex networks are managed but I'd assume it would run more or less the way it did previously, only slower.

          You're exactly right. DDoS results in maybe staff not being able to email briefly, just annoying crap... Even that can be avoided with planning.

          It doesn't imply any further breaching. Maybe a trigger for systems audit - possibly a good thing in an ironic way.

          What triggers further inspection in my (PCI-DSS) infra is not DDoS... No, it's traffic from TOR endpoints that registers any blip on the routers.

          I've no issue with TOR. It has my best wishes. I will say though, our systems see not 1 byte of TOR traffic

        • Also, systems under stress tend to become vulnerable to secondary infections

          But how?

          Security team focused on something else...

        • But how?

          People.

          Everyone's under a lot of pressure to get things back up and running, and that's a big incentive to cut corners with procedure. Suppose someone calls you during a DDOS crisis and says "hi, I'm the highly paid consultant your boss' boss hired to handle this. I need you to go to www.wefixsecurityforyou.ru and download and run the DDOS diagnostics tool." You can't reach your boss to verify because your email and IP phones are down. What would you do? Do you have the guts to say no and risk being the guy

  • by Anonymous Coward

    lose $100,000 or more per house of downtime

    That's what happens when your spell-checker is under attack.

  • by Anonymous Coward

    More than 1 hour to detect a DDoS? Either those DDoS are really incompetent and don't clog the intertubes as intended or people are paying way more than they need, because cost per mpbs is higher in USA than most rest of the civilized world. Or just the network admins are complete idiots and can't see a showel when it hits them in the face, or all their IT is based in a 3rd world subcontinent and can't detect the DDoS because they just lost connection to the system they are supposed to manage.

    If you are hit

  • by Anonymous Coward

    DDos attacks are the last gasp of the malware industry. All other attacks are known and avoidable, so hysteria must be focussed on DDos attacks to justify NSA surveillance of everyone.

    • Just makes IoT manufacturers liable for their devices' participation in such an attack and you'll see that problem vanish quickly.

  • >>> The global response also affirms the prevalent use of DDoS attacks to distract as "smokescreens" in concert with other malicious activities that result in additional compromise Uh - DDoS as smokescreen for malicious activities? That required affirmation? http://wiki.cas.mcmaster.ca/in... [mcmaster.ca]

Technology is dominated by those who manage what they do not understand.

Working...