03.12.2021 Views

Cyber Defense eMagazine December Edition for 2021

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge! Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG CDMG is a Carbon Negative and Inclusive Media Group.

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge!

Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

CDMG is a Carbon Negative and Inclusive Media Group.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The New Normal<br />

Several factors have converged to drive terabit-class attacks. Attackers continue to build massive<br />

botnets, the armies of infected devices that can direct malicious traffic at targeted systems. Meanwhile,<br />

IoT devices, which too often have lax cybersecurity standards, have only increased the number of devices<br />

available to compromise.<br />

A second factor is the continued development of reflection amplification attacks. Think of it this way: in<br />

most DDoS attacks, a targeted system is flooded with requests <strong>for</strong> in<strong>for</strong>mation that initiate a response. In<br />

a reflection attack, attackers disguise the origin of the attack traffic to make it appear that it is coming<br />

from the targeted network or device. In other words, the attack tricks the targeted system into sending<br />

the response back to itself. But the size of the request <strong>for</strong> in<strong>for</strong>mation and the response are not always<br />

symmetrical. For some internet-based services, a request <strong>for</strong> in<strong>for</strong>mation initiates a response that is far<br />

larger in proportion. By targeting these services, attackers can significantly amplify the size of their attack.<br />

A reflection amplification attack both magnifies the amount of malicious traffic an attacker can generate,<br />

and obscures its source. In the first half of <strong>2021</strong> alone, threat actors weaponized at least seven new<br />

reflection and amplification vectors. The deployment of this new tactic ignited an explosion of new attack<br />

modes. Along those lines, the number of vectors used in multivector DDoS attacks has soared, with a<br />

record-setting 31 attack vectors deployed in a single attack against one German organization.<br />

That’s the type of attack launched against GitHub. Known as a memcached attack. Open source and<br />

free, Memcached is a high-per<strong>for</strong>mance, distributed memory caching system designed to optimize<br />

dynamic web applications. The amplification capabilities of Memcached servers is so great that if you<br />

send a single request, that request could send back more than 50,000 responses.<br />

Mixing Tactics, Vectors, and Targets<br />

Large attacks are relatively easy to identify by automated defenses. But that has value in itself to<br />

attackers. A large DDoS campaign may, <strong>for</strong> example, provide cover <strong>for</strong> another attack, and threat actors<br />

can adapt their tactics to overcome defenses when volume alone does not suffice (though, to be clear, a<br />

big attack still causes many problems).<br />

An emerging trend has been the development of adaptive attack techniques designed to evade traditional<br />

defenses. These types of attacks require extensive pre-attack research and reconnaissance to identify<br />

vulnerabilities. The result, however, is an attack perfectly calibrated to overcome an organization’s<br />

defenses. Furthermore, attackers don’t always need to attack an organization itself to cause damage. In<br />

many cases, DDoS attacks can target service providers, including DNS servers, VPN concentrators to<br />

inflict collateral damage.<br />

Defending Against Terabit-Class Attacks<br />

Overall, the first half of <strong>2021</strong> saw a staggering 11 million DDoS attacks. It’s not a matter of if a company<br />

will find themselves in the crosshairs of a DDoS attack, it’s a matter of when. The pandemic, and its<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 134<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!