Corero Network Experts Warn That DDoS Attacks Will Rise Higher In 2016

Posted: Dec 14 2015, 11:07am CST | by , in News | Technology News

 
DDoS attackers
Photo credit: Getty Images

Don't Miss: This How to find Fingerlings in Stock

A Trends and Analysis report recently released by Corero Network Security in the United Kingdom has revealed that cyber-hackers will deploy more of DDoS attacks to distract IT teams in order to infiltrate network systems and steal sensitive information which might include credit card details and personally identifiable data among others.

Corero Network Security is a specialist at first line of defense solutions designed to thwart and defeat DDoS attacks. The team disclosed that online hackers will expand on DDoS attacks by causing short service interruptions which will get IT teams preoccupied with restoring functions while they attack under the smokescreen.

Most of the DDoS attacks that Corero customers experienced this year lasted less than 30 minutes in duration and covered less than 1 Gbps in scale.

The Chief Operating Officer of Corero, Dave Larson, revealed that DDoS attackers will build on what they had achieved so far this year to launch more extensive and calculated attacks next year, and they will be leveraging on various techniques of attacks until they succeed in their dark bids.

“Traditional approaches to DDoS defense simply cannot catch these sophisticated attacks – only by using an always-on, inline DDoS mitigation solution that automatically removes the threat and provides real-time visibility will IT teams be able to harden their security perimeter to deal with this emerging security threat,” Larson revealed.

Having seen a systematic manner in which DDoS attackers were demanding for ransom via Bitcoin, Larson believes the ransom development will rise higher next year unless business organizations took urgent and extensive measures to beef up their own internet security.

“Just one highly publicized participant will further fuel the epidemic by causing these demands to spread like wildfire,” Larson explained. “By deploying in-line, real-time DDoS mitigation tools, properly prepared organizations can stem this tide by refusing the ransom requests, secure in the knowledge that they are protected and can withstand the storm.”

Corero has observed that the cyber-hackers deploy an hybrid, multi-vector approach to attacking a potential victim, and they are already growing their schemes to an industrial level of sinister operations.

“Lizard Squad is already selling DDoS attacks-as-a-service for as little as $6 a month. To expedite the process, opportunistic cyber criminals may already be developing ransom kits to allow ransom demands to be automated even further. These attack tools know when they’re successful and they react in real-time. This level of automation works faster than humans and requires in-line, always-on, DDoS mitigation tools to provide a robust defense,” he added.

To make things so much worse, there is an increase in the number of unsecured end points in the market, and these are all open to potential attacks. This provides the attackers with the leeway to scale up their sordid activities into the coming years with very little chances of being caught.

Holiday Gift Guides and Deals

Get your Holiday gifting inspired by Best Toy Gifts with High STEM Value and the Top 10 toy gifts under $10 if you are on budget. The most popular Holiday 2017 toy list include Fingerlings, Crate Creatures and more. Don't miss the new Holiday deals on Amazon Devices, including $29.99 Fire tablet.

This story may contain affiliate links.

This free App Solves You Holiday Shopping Problem


Download the free Tracker app now to get in-stock alerts on Fingerling, Luvabella, SNES Classic and more.

Latest News

Comments

The Author

<a href="/latest_stories/all/all/52" rel="author">Charles I. Omedo</a>
Charles is covering the latest discoveries in science and health as well as new developments in technology. He is the Chief Editor or Intel-News.

 

 

Advertisement

comments powered by Disqus