Every third company in Germany became a victim of cyber-attacks in 2018. This is the result of the Cyber Security Survey conducted by the Federal Office for Information Security. In almost 90% of the cases, the attackers were successful and caused business interruptions. This, in turn, produced costs for forensic investigations and the restoration of IT systems. Moreover, every fifth company affected suffered reputational damage.
The Link11 Cloud Security Platform is built to ensure resilience and performance for its customers’ IT infrastructure. With a network of globally distributed filter clusters and CDN nodes that are connected to the most important internet exchange points, customers benefit from highest security standards, low latencies and maximum availability.
The annual report for 2018 analyses over 54,000 DDoS attacks that the Link11 Security Operation Center fended off for its customers between January and December. Particularly noteworthy is that compared to the previous year, the attacks have increased in complexity and intelligence. The proportion of combined DDoS attacks that bundle up to 10 different attack tools has risen sharply. In addition, it has been observed that within 12 months, perpetrators deployed several new, highly efficient DDoS attack techniques in Europe.
Cyber-crime is on the rise! Every year more and more incidents are registered, and with more complex and devastating attacks, it is becoming increasingly difficult for businesses to keep pace with cybercriminals.
More and more business-critical processes are ending up in the cloud. The number of apps and devices connected to it will continue to grow in the coming years. This not only requires a strategy to deal with the business aspects and process optimization. A security strategy that also considers the latest threat scenarios is essential as well. Companies should therefore draw on external advice in order to explore how cloud-based security solutions help to minimize the risk of attacks.
Online lotteries, betting and gaming services constitute a billion-euro market – which also makes them a popular target for cyber-attacks. Few industries rely as heavily on system availability as gaming and gambling, making effective protection from virulent web threats crucial. A modern system designed to repel DDoS attacks must be able to recognize and distinguish between these methods and implement countermeasures accordingly.
Putting a stop to DDoS attacks. A.T.U Auto-Teile-Unger GmbH & Co. KG has deployed Link11 to protect its central online shops and all IP access points at the Link11 data center. The German car service market leader’s entire web traffic is inspected by the Link11 DDoS filter before reaching A.T.U.’s infrastructure, ensuring that the company’s business activities are not interrupted by DDoS attacks. Even though the work being done at A.T.U workshops is traditionally hands-on and analog-based, the strategic significance of their web presence has grown.
DDoS attacks are becoming a growing problem from a significant number of organizations, with threat actors deploying increasingly sophisticated attacks at an alarming rate. Successful attacks can have potentially devastated consequences for businesses, taking companies offline, impacting upon their sales and ultimately damaging their reputation amongst customers. This white paper looks at why traditional security measures are failing to protect organizations against DDoS attacks and outlines the need for integrated artificial intelligence capabilities in security solutions to help effectively tackle them.
The security specialists at Link11 have evaluated and summarized the DDoS trends of the 3rd quarter of 2018 in a report. The statistics and analyses are based on data from almost 16,000 attacks on targets in Europe and show a significant increase in the total number of attacks. Furthermore, the report clearly shows that the destructive power of these attacks is growing relentlessly. High-volume attacks with more than 100 Gbps and complex multi-vector attacks are no longer an exception.
Leading consumer delivery company Hermes Germany is using Link11´s cloud-based DDoS protection solutions in order to protect their whole IT infrastructer and web applications against all kinds of Distributed Denial of Servcie (DDoS) attacks. After being increasingly concerned about the rapid growth in DDoS attacks in 2017, the logistics service provider decided to invest in a solution that protect their entire IT infrastructure including VPN and mail servers, firewalls, applications and web domains against these kind of attacks. Read the full case study and learn more.
Cybercrime is on the rise. Major cyber-attacks keep making news-headlines and organizations are exposed to more and more sophisticated forms of attacks. The implications of such an attack can be devastating and quickly go into the millions. An increasingly targeted component of companies´ IT estates are web applications. Therefore, it is vital for organizations to know how to protect their web applications against cyber-attacks.
The Link11 Security Operation Center has published its DDoS report for the second quarter 2018. Despite the fact that the number of attacks declined between April and June, the complexity and impact of the attacks has increased. Multivector attacks exploiting different weaknesses in IT infrastructures accounted for almost half of all attacks during the second quarter. The attackers also conducted high-volume attacks for which they used the reflection amplification vectors SSDP, CLDAP, DNS and Memcached.
AI in Cybersecurity and its Ramifications for Enterprise
Artificial Intelligence (AI) will change cybersecurity significantly. But the same applies to cybercrime. Organizations among all industries will feel the impact of AI to a certain extent. The impact on the cybersecurity industry, however, will be the most noticeable. Learn which role AI will play on both sides of the cyberwar and how you can protect your organization against AI-driven cyberattacks.
Within just a few weeks, the DDoS landscape underwent some major changes in the first quarter of 2018. An extremely dangerous new DDoS vector that appeared out of nowhere flooded the networks around the globe with high-volume attacks. The Link11 Security Operation Center (LSOC) also observed dozens of attacks in Central Europe. Another major threat emerged in the form of attacks using the SSDP protocol, which once again reached peak bandwidths of over 100 Gbps.
In the fourth quarter of 2017, the Link11 Security Operation Center (LSOC) fended off 13,452 DDoS attacks. That was 116% more than in the previous year. The more than 13,000 attacks totaled 100,510 minutes or 1,675 hours. Attacks lasted seven minutes on average. The longest attack occurred on December 15 and lasted 194 minutes.
An increasing number of attacks, more aggressiveness, new vectors and new emerging botnets make DDoS an increasingly important topic for unsecured organizations among all industries. Throughout the past months, there was a continuous increase of the average bandwidth among with a rising number and duration of attacks.
Between late April and late May 2017, a DDoS attacker calling himself ZZb00t was active primarily in Germany. British companies were also hit by his attacks. The Link11 Security Operation Center (LSOC) was able to gain insights into numerous attacks carried out by the self-proclaimed vulnerabilities hunter and analyzed the attack patterns. Beside his meticulous research into the weak spots of his victims’ IT infrastructure, his prolific Twitter communications stood out, whereas previous attackers such as DD4BC and Stealth Ravens did not seek publicity. The report summarizes attack analyses and contains excerpts from ZZb00t’s Twitter messages, which have since become inaccessible.
The number of DDoS attacks remained consistently high during the first quarter of 2017. Between January and March, attackers directed their attacks to targets in Europe 11,510 times. According to analyses by the Link11 Security Operation Center (LSOC), this means that every two minutes a business in Europe suffered a DDoS attack.
Within 12 months, the amount of DDoS attacks has more than doubled. In the 4th quarter of 2016 the DDoS threat reached a new alarming record-high with 11,575 attacks. Compared to the 4th quarter 2015, this means an increase of 117% in Central Europe alone. The Link11 Security Operation Team (LSOC) had to defend 125 attacks per day.
The DDoS threat reached a new alarming record-high with 9,500 attacks during the 3rd quarter of 2016. This means that in Central Europe the amount of DDoS attacks increased by 37.5% compared to the 1st quarter. Averagely the Link11 Security Operation Center (LSOC) had to defend 103 attacks daily. On the 6th of July 256 attacks on targets in Central Europe making this the most dangerous day of the quarter.
The Link11 Security Operation Center (LSOC) has defended and analyzed over 9,000 attacks that targeted businesses in the DACH region during the 2nd quarter of 2016. During this time frame the LSOC registered an increase of DDoS attacks by 36%. This means that the Link11 Security Operation Center (LSOC) identified and blocked averagely 104 attacks a day. The most targets were attacked in May.
The recent Link11 DDoS report is based on the analysis of approx. 7,000 DDoS attacks on targets in German-speaking Europe from January to March 2016. It summarizes the current trends in DDoS attacks with attack bandwidths, attack vectors, and source countries. An analysis of extortion attempts associated with DDoS attacks in the first three months of 2016 and a case study of DDoS attacks against cinema operators in Germany add further details to the report.
In the Link11 DDoS report for Central Europe, Link11 analyzed and processed over 5,000 attacks against companies in Europe during the fourth quarter of 2015. For the first time, the security report provides a clear overview of the specific situation regarding DDoS attacks in Central Europe.
The Link11 Security Operation Center (LSOC) first registered DDoS extortion attempts by the "Armada Collective" group in October 2015. The working methods of the perpetrators were very similar to those of the already well-known extortion gang DD4BC. This report summarizes the details of the Bitcoin extortion by the Armada Collective.
In the summer of 2015, the cybercriminal group DD4BC was very active in Germany and Austria with DDoS extortion attempts. During this wave of extortion, the Link11 Security Operation Center (LSOC) fended off numerous attacks and analyzed the attack patterns and the threat situation. This Link11 insights report "DDoS extortion by DD4BC" summarizes the results.