20 Years of DDoS - a Brief Look at the Past and what the Future will Bring
The next few days will mark the anniversary of the first known case of a cyberattack method that continues to keep companies of all sizes and industries on their toes. On July 22, 1999, a computer of the University of Minnesota in the USA was attacked by a network of 114 other computers – on which the program Trin00 was running, which was later used time and again to launch DDoS attacks. At that time, the malicious code on the affected computers eventually caused them to bombard the research institution's network with data packets. This in turn led to an overload of the computers, and legitimate requests could no longer be processed. The university's system was down for two days. This incident in the United States was the first Distributed Denial of Service (DDoS) attack.
Twenty years later, this type of attack is feared by companies more than ever – as it causes massive financial losses while, at the same time, damaging the reputation of the company like hardly any other can. In a 2017 report, the Federal Criminal Police office (BKA) stated that DDoS attacks are now the most frequently observed security incidents in cyberspace. Such high bandwidth "overload attacks" often cost companies millions. A fact which is not surprising considering that in their 2019 Cost of Cybercrime study, Accenture put the costs incurred in connection with cybercrime at around $13 million on average.
DDoS attacks are far more devastating for businesses today than they were a few years ago. This is mainly due to the advent of the Internet of Things (IoT). Despite all of the advantages that the IoT brings with it, from development through to the networked economy, inadequately secured IoT devices ultimately enable cybercriminals to set up large botnets even more effectively and quickly in order to launch an attack. And this trend will continue to rise over the next few years. According to an IHS study, by 2025 there will already be as many as 75.4 billion IoT devices. This means there would be 10 times more IoT devices than people, which can be misused easily by criminals for cyberattacks due to their inadequate protection. What's more, there is an increasing risk due to server capacities, which are rented by cybercriminals with the help of stolen credit card data and then used for cyberattacks. The emergence of the 5G mobile communications standard is also likely to lead to attacks with even higher bandwidths in the future, primarily due to the increased data transmission rates. And these have already reach destructive heights: In March last year, the biggest known DDoS attack was carried out on an American online service – at its peak it reached 1.7 terabits per second. Companies have no choice – they must participate in Industry 4.0 if they want to survive in the digital age. Unfortunately, however, they expose themselves to an enormous risk if basic safety measures are not taken.
Despite the destructive power of modern DDoS attacks, it should also be noted that companies are no longer helplessly at the mercy of these attacks. With modern protection solutions, the risks can be averted effectively so that downtime is prevented. AI-based and automated solutions in particular, which are not dependent on the human factor for defense, have proven themselves here. And the reasons are quite obvious: More and more cybercriminals are making use of this technology themselves and are managing to launch automated attacks in which only solutions that work in real time have a chance. Static, rule-based attack tactics are a thing of the past. It is therefore obvious that defense strategies must also adapt to the new "intelligence" of the attacks. The future belongs to solutions that make use of machine learning and permanently analyze data streams, establish a (data) communication profile for the company and derive adaptive security strategies. If companies adapt their defenses in line with the ongoing, tense threat situation and keep pace with current cybercriminal developments, massive business and reputation losses can be prevented.
Stay updated on current DDoS reports, warnings, and news about IT security, cybercrime and DDoS protection.
Follow Link11 on Twitter
A simple visualization of how the Underground Cybercrime Economy cashes in on data and DDoS attacks. To learn more,…
9 Retweets 8Read More
How to protect your business and website from DDoS attacks during the biggest sales period of the year:…
5 Retweets 6Read More
What are DDoS Attacks and how do cybercriminals use them as weapons to shut down IT infrastructures? And more impor…
7 Retweets 5Read More
This is why (and how) you should block bots on your business website (includes a list of most common bot attacks):…
13 Retweets 9Read More
What is Web Application Firewall, why do you need it and how does it protect your company? Learn more by reading ou…
3 Retweets 5Read More
@RandyLoss Hah, you weren't the only one saying that.
0 Retweets 0
@vxtrade Your company might ;)
0 Retweets 1
@deckhand25 He is not, but close enough! ;)
0 Retweets 1
What would you do if you received a 180 000€ DDoS extortion email warning to exceed your web infrastructure defense…
1 Retweets 4Read More
Get a detailed and up to date overview of the global DDoS threat landscape by taking a look at our DDoS Report from…
6 Retweets 5Read More
@SecurityParalok Link11 DDoS Protection can help!
0 Retweets 0