Connect with us

CyberSecurity

Small, bit-and-piece cyber attacks increase 233% in 2021 – Nexusguard

Attackers rely on small-sized patterns to avoid detection, as predicted by Nexusguard researchers

Published

on

Nexusguard discovers DDoS on srvice providers

Small bit-and-piece DDoS attacks (distributed denial of service) boomed by 233% in the first half of 2021, revealed Nexusguard researchers in the Threat Report FHY 2021.

As the pandemic carried on into 2021, hackers experimented with new attack patterns to avoid signature-based detection.

Nexusguard

InfoGraphic by Nexusguard

In the first half of 2021, more than 99% of all DDoS attacks were smaller than 10Gbps, as Nexusguard had predicted in 2020.

These small, nimble attacks can cripple communications service providers (CSPs) and Internet service providers (ISPs) if they leave detection to threshold or signature-based methods alone.

Attackers are continuing to diversify their approaches with bit-and-piece attacks to bring down target networks and infrastructures.

More than 95% of attacks were smaller than 1Gbps each, of which Nexusguard analysts believe a majority were launched using readily available and inexpensive DDoS-for-hire services.

Rather than launching large bandwidth attacks against their targets, researchers noted that perpetrators chose to employ attacks using high packet-rate loads of small-sized traffic from DDoS-for-hire services, with the aim of evading DDoS mitigation detection systems.

DDos

Diagram by Nexusguard

“The high level of intricacies behind communications service provider networks causes them to generally allow all types of traffic to pass through, which leads to smaller or spoofed types of attacks to strike undetected,” said Juniman Kasman, chief technology officer of Nexusguard. “Behavioral detection and mitigation approaches are strongly recommended for targeted networks since they can compare peacetime with battles and take a wider range of factors into consideration than anomalous thresholds or attack signatures.”

Traffic spoofing and UDP-style attacks were popular in the first half of the year, with an 84% increase in UDP attacks compared to the previous six months. Nexusguard observed several types of UDP attacks in use, one of which can cause “Black Storm” attacks theorized in recent research.

ALSO READ  Nexusguard research shows DNS amplification attacks grew nearly 4,800% YoY

Nexusguard researchers witnessed several service providers bear the brunt of DDoS attacks, including

  • China Telecom,
  • China Unicom,
  • Vodafone Türkiye,
  • Türk Telekom,
  • Turkcell İletişim Hizmetleri A.S. receiving the highest concentrations of malicious traffic.

Nexusguard advises CSPs to use deep learning-based detection methods, which can help CSPs analyze huge amounts of data quickly and accurately while overcoming the inefficiencies inherent in threshold or signature-based methods.

NexusGuard top 100

Image credit: NexusGuard

Nexusguard’s TAP100 Program helps CSPs quickly launch anti-DDoS capabilities to protect customers. The TAP100 Program removes the hardware barriers associated with typical anti-DDoS service ramp-up, allowing CSP product teams and C-suites to capture new revenue opportunities and ensure superior customer service.

You can read Nexusguard’s Threat Report FHY 2021 for more mitigation details based on data gathered from CSPs, honeypots, botnet scanning and research on traffic moving between attackers and their targets.

Advertisement
Click to comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Advertisement
Advertisement
Advertisement
Advertisement

Facebook