"Cybercriminals Get Better at Bypassing Defenses"

According to the latest Distributed Denial-of-Service (DDoS) Threat Intelligence Report from NETSCOUT, cybercriminals have become more adept at circumventing defenses with new DDoS attack vectors and methodologies. The report is based on attack information from over 190 countries, 550 industries, and 50,000 Autonomous System Numbers (ASNs). There were around six million DDoS attacks in the first half of 2022, with Transmission Control Protocol (TCP)-based flood attacks accounting for roughly 46 percent of all the attacks. Domain Name System (DNS) 'water-torture' attacks increased by 46 percent in 2022, primarily through User Datagram Protocol (UDP) query floods, while carpet-bombing attacks made a strong comeback near the end of the second quarter. Overall, DNS amplification attacks decreased by 31 percent compared to the same period last year. Malware botnets have also grown significantly, with 21,226 nodes tracked in the first quarter compared to 488,381 nodes in the second. As a result, there have been more direct-path, application-layer attacks. In the first half of 2022, attackers conducted more pre-attack reconnaissance, tested a new attack vector called TP240 PhoneHome, unleashed TCP flooding attacks, and expanded high-powered botnets to wreak havoc on network-connected resources. Furthermore, bad actors have openly embraced online aggression through high-profile DDoS attack campaigns linked to geopolitical unrest, with global ramifications. This article continues to discuss key findings from NETSCOUT's latest DDoS Threat Intelligence Report.

BetaNews reports "Cybercriminals Get Better at Bypassing Defenses"

Submitted by Anonymous on