Last year saw an unprecedented uptick in the volume, size and scope of distributed denial of service (DDoS) attacks.
Led mostly by the Mirai malware, this drumfire of DDoS attacks took advantage of unsecured Internet of Things (IoT) devices to build massive botnets and launch mammoth DDoS attacks, the likes of which the industry had never seen. Mirai is blamed for the DDoS attack against DNS provider Dyn that knocked many of the web’s biggest sites offline; the more than 600 Gbps attack against Krebsonsecurity; and the attack against service provider OVH. For the first time, DDoS attacks exceeded the 1 Tbps threshold.
And Mirai is still making waves.
In his keynote presentation at RSA Conference 2017, Intel Security Senior Vice President and General Manager Christopher Young stated the obvious: Mirai is thriving.
“We can’t think of the Mirai botnet in the past tense. It’s alive and well today, and recruiting new players,” he said.
Researchers suggested Mirai was just the beginning. Making public the code needed to launch an IoT-powered botnet was a first salvo. A rival botnet malware, Leet, quickly followed on the heels of Mirai and used SYN payloads different than Mirai. And in 2017, there’s sure to be more chapters in this saga.
This is the era of the DDoS of Things (DoT), where bad actors use IoT devices to build botnets which fuel colossal, volumetric DDoS attacks. The DoT is reaching critical mass — recent attacks have leveraged hundreds of thousands of IoT devices to attack everything from large service providers and enterprises to gaming services, media and entertainment companies.
And it’s estimated that there will be 24 billion connected IoT devices by 2020 – everything from cameras and phones to refrigerators and cars to doorbells and watches. And many of these devices are manufactured by companies where cyber security is not their core competency.
As an attack method, it’s now even easier for attackers to commandeer IoT devices for nefarious purposes. Many devices still use unsecure default credentials and are ripe for the picking. Basic instructions are available online and the lucrative DDoS-for-hire market is expanding.
The DDoS of Things is powering bigger, smarter and more devastating multi-vector attacks than ever imagined.
This increased activity has lead Deloitte Global to predict that attacks reaching or exceeding 1 Tbps or more will be commonplace in 2017. Deloitte posits that there will be an average of one 1 Tbps attack or larger per month this year, as the total number of DDoS attacks surpasses 10 million globally.
Need more proof? This DDoS of Things infographic has numbers that are as startling as they are informative. For example, there are roughly 3,700 DDoS attacks per day, and the cost to an organization can range anywhere from $14,000 to $2.35 million per incident. And once a business is attacked, there’s an 82 percent chance they’ll be attacked again.
Is your business prepared to battle the influx of IoT-driven DDoS attacks?
DDoS attacks are damaging. Along with service disruption, they have a lasting impact that harms your brand, your revenue and your user experience. You need to fight back. You need a weapon against volumetric, multi-vector DDoS attacks. You need major firepower to stand up to the DDoS of Things.
A10 Thunder TPS is that weapon. Thunder TPS is a line of high-performance solutions that detect and mitigate volumetric, multi-vector DDoS attacks at the network edge. Thunder TPS can mitigate DDoS attacks up to 300 Gbps, and up to 2.4 Tbps in a synchronized cluster — meaning you’re more prepared to do battle against the DoT and its arsenal of large, frequent attacks.
A10 Thunder TPS is agile, efficient and battle-tested. It’s your best defense against the DoT.
Learn more about A10 Thunder TPS.