Story image

Millions of DDoS attacks hit Asia Pacific in 2017

25 Jan 18

Automation and managed services may be the key mechanisms for fighting distributed denial of service (DDoS) attacks, according to new findings from NETSCOUT Arbor

The 13th Annual Worldwide Infrastructure Security Report (WISR) confirms the prevalence and scale of DDoS attacks, particularly against service providers and enterprises.

There were 7.5 million attacks across Arbor’s ATLAS infrastructure, which makes up one third of global internet traffic. The biggest attack reported by a service provider reached 600 Gbps, slightly lower than an 800 Gbps attack reported in 2016.

NETSCOUT Arbor chief technology officer Darren Anstee says attackers shifted their focus away from huge attack volumes and instead focused on complexity to leverage IoT device weaponisation.

“Attackers have been effective, and the proportion of enterprises experiencing revenue loss due to DDoS nearly doubled this year, emphasising the significance of the DDoS threat.”

57% of enterprise and 45% of data centre operators also experienced saturated bandwidth due to DDoS attacks.

Multi-vector DDoS attacks increased 20% since 2016. 59% of service providers and 48% of enterprises experienced these complex attacks, which use a mix of high-volume floods, application-layer attacks and TCP-state exhaustion attacks in a single blow. These increase the attacker’s chance of success and make it more difficult for organisations to defend against them.

88% of service providers use say they use intelligent DDoS mitigation solutions – 36% use automated DDoS mitigation.

Managed service providers are also in hot demand: 38% of enterprises rely on third party and outsources services, a 38% increase since 2016.

2.25 million attacks against APAC 

2,253,265 DDoS attacks hit Asia Pacific organisations last year. The biggest attack reached 622 Gbps and occurred between August 1 and 2. The biggest packets per second (PPS) attack reached 287 Mbps, which occurred at around the same time.

Korea was the source of many DDoS attacks (45.63%), followed by the United States (40.8%), China (32%) and Japan (25.31%).

Australian organisations experienced 131,700 attacks. The largest attack occurred in June and reached 228 Gbps. The largest PPS attack reached 39.9 Mbps in September.

The top four source attack countries include the United States (29.43%), China (25.18%), the United Kingdom (23.05%) and Russia (22.34%).

New Zealand organisations experienced 31,373 DDoS attacks in 2017. One of the biggest attacks occurred between August 2 and 3. It reached 62 Gbps. There were similar spikes between August 5-6 and 7-8, reaching between 50 and 60 Gbps.

The largest PPS attack occurred on August 12, which reached 24 Mbps.

Of the attacks against New Zealand, 85.5% seemed to originate from the United States. 61.35% were from China, 54.99% from Great Britain and 54.92% from the Netherlands.

The challenges for security teams

According to the report, network and security teams face challenges including staff shortages and active threat landscape.

“The results of the WISR survey, together with our ATLAS data, demonstrate why an integrated multi-layer defence from the data centre to the cloud is required,” Anstee concludes.

Additional facts and figures:

  • The top three DDoS attack motivations are online gaming; criminals showing off their attack capabilities; and extortion
  • 57% cited reputation/brand damage as the main business impact, with operational expenses second
  • 56%  experienced a financial impact between $10,000 and $100,000, almost double the proportion from 2016
  • 48% of data centre operators said customer churn was a key concern following a successful attack
  • The survey respondents comprised 55% service providers and 45% in enterprise, government and education.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.