This is the Twitter entry of the cybercriminal group Phantom Squad shortly before Christmas 2015. The group uses the tweet to comment on their successful DDoS attack (Distributed Denial of Service attack) on Xbox Live, which paralyzed Microsoft's game console for several hours. The hacker groups
Stealth Ravens and XMR-Squad recently caused a sensation in the IT security world.
DDoS Attacks - What Does that Actually Mean?
DDoS attacks are deliberately induced and
coordinated attacks on networks and servers. DDoS freely translated means:
denial of service. DDoS attacks aim to bring target computers to their
knees with a gigantic flood of automated queries and packets with incorrect IP
addresses, and with these DDoS attacks to shut down the server due to overload.
How Relevant Are DDoS Attacks?
The danger of DDoS attacks should not be
underestimated, especially for companies: Professional and repeated waves of
attacks can drive companies to ruin or possibly trigger additional compensation
payments, which companies should actually use to protect themselves from cyber
insurance. DDoS attacks can be planned and carried out by cybercriminal
associations in dark corners of the Internet with little effort. The unsightly vision of the future: Attacks on competitors with whom companies are “at war”. If
competitors have the appropriate contacts and financial resources, they may be
able to bring the competitor's business to its knees with DDoS attacks.
Heavy bombing of Internet servers is not
uncommon these days. Although every second DDoS attack is currently still
taking place on online gaming platforms, as described above, the risk for other
industries is growing. At the moment, the most popular destinations are mainly
companies in the technology and media industry, as well as the hotel and travel
industry.
Worrying: The number of attacks rose by 180
percent from 2014 to 2015, according to the State of the Internet Security Report from
Akamai, one of the world's leading server providers, which accounts for around
15-30% of global web traffic should deliver. Applications in the cloud are, particularly at risk. 88 percent of all attacks on web applications took
place over unsecured HTTP connections, the remaining 12 percent over HTTPS.
What Is the Strategy of Cyber
Criminals in DDoS Attacks?
The attacks take place simultaneously from a
network of distributed computers. For the attack to be successful, the attacker must set up a system in which he has more bandwidth. If
he does not have this bandwidth, he builds the systems over several different
individual systems with a small bandwidth to plan the attack - the
so-called botnets. "Zombie computers" from Internet users and
poorly configured servers that are permanently attached to the network are
connected together and attack the target in a coordinated manner. The
attacked network does not notice that it is infected with malicious software
and that it is making its own system part of a “zombie attack network”. The
highest, Linux computers.
Know more about total security software to prevent cyber attacks
Classic DDoS
attacks have the following targets that lead to the collapse of the network
system:
·
Overload of the access link
· The collapse of the firewall capacities
· The collapse of the web and database servers.

No comments:
Post a Comment