DDoS follow-up attack risk now one in three
25 April 2014 | 0
Organisations have a roughly one in three chance of a follow-up DDoS attack after an initial incident, Internet giant Akamai has calculated, using figures from the last quarter of 2013. This represented a significant spike compared to the rest of the year.
Although quarterly figures in the firm’s State of the Internet Report often reflect short-term trends, the rise in the number of organisations suffering repeat DDoS attacks was still marked, reaching 56 organisations out of a total of 162 hit during the quarter.
For 2013 as a whole (note: recent Akamai acquisition Prolexic publishes its own figures), 177 organisations were affected by repeat attacks with around half experiencing a follow-up and 69 subsequently being attacked between three and five times. A Further 22 were hit with between six and 20 times while one unfortunate outfit experienced a DDoS incident “nearly every other day,” Akamai’s researchers said.
Amidst the brute unpleasantness of DDoS, this sort of detail is interesting. Serious DDoS attacks are usually seen as an occasional nuisance but it is clear that for a significant subset of valuable targets they are becoming a way of life.
Using attacks, rather than unique targets, as the measure, the quarter saw 346 attacks out of a 2013 total of 1,213, a 50% rise over 2012, thanks in part to a spate of hacktivist DDoS against the Government of Singapore in response to internet controls. Akamai now estimates that 2014 will see the attack total rise to around 1,700.
Akamai does not say much about sector-specific trends beyond noting that enterprise and commerce targets make up 70% of the organisations affected by DDoS attacks, which is a shame given the scale of incidents affecting US banks during the year.
Earlier this month the US Federal Financial Institutions Examination Council (FFIEC) issued new guidelines to the sector that demands the sector put in place more mitigation and have adequate response plans. The body also called for US institutions to inform the FFIEC of attacks as they occur so intelligence could be passed around the sector. At some point, disclosure could become mandatory for this kind of enterprise.
John E Dunn, Techworld