Home / Blogs

DDoS Attacks: What's in Store for 2012?

Alexander L. Berry

According to Kaspersky Lab, 2011 has seen "numerous DDoS attacks with a variety of motives," many of which will "go down in the annals of cybercrime." As we look ahead to 2012, it's worth examining some of those motives to see what they portend.

Possibly the most common motive has been personal retribution. Often, this means one individual attacking another, not a company or even a website. Example: an online gamer disabling an opponent in XBOX Live. Since the victims aren't high-profile, these attacks usually don't get much press.

Political or social activism — "hactivism," if you prefer — has dominated DDoS headlines over the past year. From defenders of WikiLeaks to people protesting anti-piracy laws, those with an axe to grind have increasingly gone online. As protests of all kinds seem to be gaining momentum these days, it will be interesting to see what develops next.

Extortion is the original motive for DDoS attacks: extracting money from people or businesses unable (or unwilling) to protect themselves. While there are new laws to stop this, enforcement can be tricky when the attackers or their botnets are in countries without extradition.

Competitive advantage is another established motive. We tend to see this more among smaller businesses whose competitors are less likely to have protection.

Finally, there's good old-fashioned gang warfare, where rival criminal groups go after one another. Sometimes entire nations get involved, as when North Korea targets South Korea.

With so many different motives and such a diversity of offenders, one conclusion is crystal clear: DDoS attacks are easier than ever to launch. Anyone with basic skills (hence the term "script kiddie") and a high-speed connection can cause serious damage. This explains why 3 out of 4 businesses report having experienced DDoS attacks, with over 7,000 attacks occurring every day.

And it's no longer just websites that are being targeted. Email and even VoIP services are in the crosshairs, witness the recent attack that shut down TelePacific's call processing for thousands of customers.

No question, all these developments are a warning for next year. Expect more and larger attacks — and more damage to those who aren't prepared.

By Alexander L. Berry, Senior Vice President, Enterprise Services at Neustar

Related topics: Cyberattack, Cybercrime, DDoS, DNS, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Comments

To post comments, please login or create an account.

Related Blogs

Related News

Topics

Industry Updates – Sponsored Posts

Introducing getdns: a Modern, Extensible, Open Source API for the DNS

Why We Decided to Stop Offering Free Accounts

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

Tony Kirsch Announced As Head of Global Consulting of ARI Registry Services

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks

Dyn Acquires Managed DNS Provider Nettica

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

Why Managed DNS Means Secure DNS

Rodney Joffe on Why DNS Has Become a Favorite Attack Vector

Motivated to Solve Problems at Verisign

Dyn Announces Largest Quarter In Company History

Diversity, Openness and vBSDcon 2013

How Does Dyn Deliver on Powering the Internet? By Investing in Standards Organizations Like the IETF

Neustar's Proposal for New gTLD Collision Risk Mitigation

Dyn Announces the Opening of New Data Center in Mumbai, India

15 Facts About .net to Celebrate 15 Million Registrations

SPECIAL: Updates from the ICANN Meetings in Durban

Dyn Building a Lineup of Technical Talent

IT Project Management: Best Practices in Small-Scale Engagements

Sponsored Topics