Cyber Attacks Increase 341% During COVID-19, According to Nexusguard Research
Attackers used DDoS to target remote workforce services, straining telcos, ISPs and CSPs.
During the pandemic, cyber attackers targeted industries providing connectivity, services and entertainment to populations forced to shelter-in-place, resulting in a 341% year-over-year increase in distributed denial-of-service (DDoS) attacks according to Nexusguard’s Annual Threat Report 2020. The massive shift in online behavior and reliance on connectivity strained communications service providers (CSPs) and internet service providers (ISPs) that provided the backbone for this remote work, including spikes in ransom DDoS (RDDoS) attacks to extort organizations for payment in exchange for staying online.
“During 2020, the pandemic forced a complete shift in how the world lived and worked, and attackers were ready to take full advantage of the situation, adeptly targeting connectivity and entertainment providers”
With lockdown and social distancing measures enforced across the world, 2020 saw an explosion in online gaming and dependence on the internet, which were attractive targets for attackers. Motivations for the attacks ranged from financial gains, political and economic benefits, revenge, cyberwarfare to even personal enjoyment. Nexusguard analysts predict that RDDoS attacks will increase 30% in the upcoming year, especially given the popularity of cryptocurrencies. Additionally, smaller attacks (less than 10 Gbps in size) will account for 99% of all DDoS attacks in the near future, since they’ll continue to be difficult to detect and economical to deploy.
Recommended AI News: Etherlite Is Giving ETL Tokens to Every ETH Wallet Holder; Biggest Airdrop Ever
“During 2020, the pandemic forced a complete shift in how the world lived and worked, and attackers were ready to take full advantage of the situation, adeptly targeting connectivity and entertainment providers,” said Juniman Kasman, chief technology officer for Nexusguard. “With attackers using stealthier, smaller attacks increasing in complexity, CSPs and enterprises will need deep learning, multidimensional DDoS detection and other advanced techniques to avoid outages.”
According to Nexusguard’s research, CSPs—especially ISPs—continue to be impacted by stealthy bit-and-piece attacks, which drip-feed junk traffic across a large IP pool. In 2020, 301 of these CSPs were hit by bit-and-piece attacks across 23 countries. Nexusguard researchers caution that CSPs and other organizations that rely on threshold and signature-based detection methods will experience severe outages from newer, evasive DDoS attacks. To help CSPs quickly launch anti-DDoS capabilities to protect customers, Nexusguard recently launched the TAP100 Program, which removes the hardware barriers associated with typical anti-DDoS service ramp-up, allowing CSP product teams and C-suites to capture new revenue opportunities and ensure superior customer service.
Recommended AI News: Inpixon Acquires The CXApp, a Leading Smart Workplace App and Hybrid Events Solution Provider
Nexusguard’s DDoS threat research reports on attack data from botnet scanning, honeypots, CSPs and traffic moving between attackers and their targets to help companies identify vulnerabilities and stay informed about global cyber security trends. Read the full Nexusguard Annual Threat Report 2020 for more details.
Recommended AI News: AI Robotics Startup Mech-Mind Completes Series C Funding Led by Tech Giant Meituan
Comments are closed.