HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Similar documents
Corero & GTT DDoS Trends Report Q2 Q3 2017

CLOUD-BASED DDOS PROTECTION FOR HOSTING PROVIDERS

WHITE PAPER Hybrid Approach to DDoS Mitigation

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

DDoS MITIGATION BEST PRACTICES

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Arbor White Paper Keeping the Lights On

DDoS Managed Security Services Playbook

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

Downtime by DDoS: Taking an Integrated Multi-Layered Approach. Arbor Solution Brief

DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT

NETWORK DDOS PROTECTION STANDBY OR PERMANENT INFRASTRUCTURE PROTECTION VIA BGP ROUTING

IBM Cloud Internet Services: Optimizing security to protect your web applications

Combating Cyberattacks Through Network Agility and Automation Sagi Chief Technology Officer

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

Safeguard Your Internet Presence with Sophisticated DDoS Mitigation.

Defending against increasingly sophisticated DDoS attacks

THE ACCENTURE CYBER DEFENSE SOLUTION

Enterprise D/DoS Mitigation Solution offering

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

WHITE PAPER. Applying Software-Defined Security to the Branch Office

The 2017 State of Endpoint Security Risk

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

AKAMAI CLOUD SECURITY SOLUTIONS

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Integrated Access Management Solutions. Access Televentures

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

The Windstream Enterprise Advantage for Banking

Data center interconnect for the enterprise hybrid cloud

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service Provider View of Cyber Security. July 2017

A10 DDOS PROTECTION CLOUD

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Use Cases. E-Commerce. Enterprise

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

How DDoS Mitigation is about Corporate Social Responsibility

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

Protecting Your Enterprise Databases from Ransomware

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Chapter X Security Performance Metrics

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Transform your network and your customer experience. Introducing SD-WAN Concierge

with Advanced Protection

Imperva Incapsula Product Overview

CABLE MSO AND TELCO USE CASE HANDBOOK

Ransomware piercing the anti-virus bubble

I D C T E C H N O L O G Y S P O T L I G H T

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Prolexic Attack Report Q4 2011

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Are we breached? Deloitte's Cyber Threat Hunting

MITIGATE CYBER ATTACK RISK

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Building Resilience to Denial-of-Service Attacks

DDoS Detection&Mitigation: Radware Solution

Arbor Solution Brief Arbor Cloud for Enterprises

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

If you were under cyber attack would you ever know?

AT&T Endpoint Security

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

KEYCLOUD BACKUP AND RECOVERY AS-A-SERVICE (BRAAS): A fully-managed backup and recovery solution for your mission critical data

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

DDoS: Evolving Threats, Solutions FEATURING: Carlos Morales of Arbor Networks Offers New Strategies INTERVIEW TRANSCRIPT

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Cybowall Solution Overview

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER

Disaster Recovery Is A Business Strategy

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

SERVICE PROVIDER DDoS PLAYBOOK

Security by Default: Enabling Transformation Through Cyber Resilience

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

Cyber Defense Operations Center

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

Kaspersky Open Space Security

Express Monitoring 2019

A Simple Guide to Understanding EDR

Chapter X Security Performance Metrics

FOR FINANCIAL SERVICES ORGANIZATIONS

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Expert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

DIGITAL TRUST Making digital work by making digital secure

Transcription:

From the Security Experts at Corero Network Security HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK Be Proactive, Not Reactive STEP-BY-STEP GUIDE

The Rise of Ransom-Driven DDoS Attacks Ransom-related Denial of Service attacks (RDoS) have been gaining popularity as of late. Recent examples span across industries from banking and financial institutions, to hosting providers, online gaming services and SaaS organizations. Unfortunately, when even one, high-profile victim chooses to engage with attackers by paying a ransom, we tend to see an increase in these types of attacks. RDoS attacks have grown in frequency as cyber criminals are constantly on the lookout for more efficient methods to attack systems and obtain profits. When faced with the costs of their business going offline if a successful DDoS attack is launched against them, some organizations may believe that paying a ransom demand represents good value for money. This approach is playing with fire, and offers no guarantee that an attack will not be launched. Thus, it s important to highlight the danger these attacks pose to businesses and learn how to build a successful defense against them. The Rising Concern of DDoS Attacks In an RDoS attack, cyber criminals send a message threatening to carry out a DDos attack, or infect an organization s operational systems with forms of ransomware, unless the payout is received

by a certain deadline. Many hackers are motivated by the potential for financial gain and the ease at which such attacks can be performed. Extortion is one of the oldest tricks in the criminal s book, and one of the easiest ways for today s hackers to turn a profit. These attacks have become so common that according to a 2016 study, Corero found that 80 percent of European IT security professionals expect their business to be threatened with a DDoS ransom attack during the next 12 months. When service availability is threatened, the victim company is facing costly implications including revenue loss and reputation damage. Thus, it is not surprising that almost half of IT security professionals (43%) that took part in our 2016 study thought that it was possible that their organization might pay such a ransom demand in the hope of circumventing an attack. The Links Between Ransom, Ransomware and DDoS Attacks DDoS attacks are increasingly used as smokescreens for more nefarious network infiltrations, such as ransomware. DDoS attackers are getting more sophisticated; their objective is not only to cripple a website, but rather to distract IT security staff with a low-bandwidth, sub-saturating DDoS attack. Such attacks typically are short duration (under 5 minutes) and low-volume, which means that they can easily slip under the radar without being detected or mitigated by some DDoS protection systems. Latency and service outages are all tangible outcomes of a successful DDoS attack ransom related or otherwise. As we know, an attack only requires a few minutes to overrun traditional security infrastructure, such as firewalls and intrusion prevention systems (IPS), offline; in effect, the network doors are wide open. While IT staff scramble to handle the momentary network

outages or system slowdowns, hackers can use automated scanning or penetration techniques to map a network and install ransomware. Corero continues to observe a steady flow of DDoS attack attempts against customers. In Q1 2017, Corero customers experienced an average of four attack attempts per day. To compound the frequency of DDoS attacks, 80% of attack attempts were less than 1Gbps in volume. The average duration of DDoS attacks is also cause for concern, as 71% of these attacks were 10 minutes or less in duration. How to Deal with DDoS Ransom Threats: Be Proactive, Not Reactive Unfortunately, most cyber security solutions focus on recovery from criminal extortion attacks, rather than defeating one. The DDoS mitigation landscape has evolved to deal with these attacks automatically and instantaneously to eliminate the threat to your business. Enterprises should take a more proactive stance when it comes to preventing ransom-related attacks, and one way they can do that is by installing DDoS protection solutions that automatically detect and block even the smallest of DDoS attacks, 24x7. Only then can IT security teams have comprehensive visibility into network incursions.

1. Recognize DDoS attack activity Large, high-volume DDoS attacks are not the only form of DDoS activity. As discussed, short duration, low-volume attacks are stress testing and finding security vulnerabilities within your security perimeter. Understand your network traffic patterns and look to solutions that identify DDoS attack traffic in real-time, removing the threat immediately. 2. Document your DDoS resiliency plan These resiliency plans should include the technical competencies, as well as a comprehensive plan that outlines how to continue business operations under the stress of a successful denial of service attack. An incident response team should establish and document methods of communication with the business, including key decision makers across all branches of the organization, to ensure key stakeholders are notified and consulted accordingly. 3. Pair time-to-mitigation with successful attack protection In the face of a DDoS attack, time is of the essence. Minutes or more before a DDoS attack is mitigated is not sufficient to ensure service availability. As you develop your resiliency plan and choose your method of DDoS protection, time-to-mitigation must be a critical factor in your decisionmaking process. 4. Do more than check the box Even firewalls that claim to have anti-ddos capabilities built in have only one method of blocking attacks: the usage of indiscriminate thresholds. When the threshold limit is reached, every application and every user using that port gets blocked, causing an outage. Attackers know this is an effective way to block the good users along with the attackers. Because network and application availability is affected, the end goal of denial of service is achieved.

Conclusion Today s DDoS attacks are almost unrecognizable from the early days of attacks, when most were simple, volumetric attacks intended to cause embarrassment and brief disruption. Today, the motives behind attacks are increasingly unclear, the techniques are becoming ever more complex and the frequency of attacks is growing exponentially. This is particularly true in light of automated attacks, which allow attackers to switch vectors faster than any human or traditional IT security solution can respond. The combination of the size, frequency and duration of modern attacks represent a serious security and availability challenge for any online organization. Minutes or more of downtime or latency significantly impacts the delivery of essential services. When you combine these factors, victims are faced with a significant security and availability challenge.

GTT s DDoS Mitigation Service GTT s DDoS Mitigation service is an always-on, managed offering that guarantees protection from DDoS attacks. The service leverages Corero s next-generation SmartWall platform technology to deliver immediate threat detection, deep packet inspection analytics and filtering of malicious traffic at GTT s scrubbing centers. GTT s DDoS Mitigation is a proactive offering, providing continuous, automated routing of traffic for cleaning, without any outside intervention required. Clean traffic is returned via MPLS IP VPN or a GRE IP tunnel. The service is also available in an on-demand, reactive, near-real-time option for clients that prefer this approach to DDoS mitigation. The service includes alerting and deep visibility into real-time and historical DDoS threats through a client portal and is backed by stringent response time SLAs, providing peace of mind that DDoS threats are mitigated quickly and efficiently. About GTT GTT provides multinationals with a better way to reach the cloud through its suite of cloud networking services, including optical transport, wide area networking, internet, managed services, voice and video services. The company s Tier 1 IP network, ranked in the top five worldwide, connects clients to any location in the world and any application in the cloud. GTT delivers an outstanding client experience by living its core values of simplicity, speed and agility. For more information on how GTT is redefining global communications, please visit www.gtt.net. GTT Headquarters 7900 Tysons One Place, Suite 1450 McLean, VA 22102 +1 703 442 5500 Copyright 2017 Corero Network Security, Inc. and GTT Communications, Inc.