Kaspersky Lab DDoS Intelligence quarterly report reveals increase in amplification attacks and return of old botnets

1st May 2018 | By Mouseworld Now Correspondent |


Mumbai, India, 1stMay, 2018: Security major Kaspersky Lab has published its report looking at botnet-assisted DDoS attacks for the first quarter of 2018. Kaspersky experts note an increase in activity by both old and new botnets, growth in the popularity of amplification DDoS attacks and the return of long-lasting (multi-day) DDoS attacks.

DDoS botnets attacked online resources in 81 countries in the first quarter of 2018. The countries experiencing the largest number of attacks were once again China, the US and South Korea, which all continue to lead in terms of the number of servers available to attackers and, hence, the number of sites and services hosted on them. Hong Kong and Japan, meanwhile, replaced the Netherlands and Vietnam among the top 10 most targeted countries.

The changes to the 10 countries hosting the most C&C servers were more pronounced, with Italy, Hong Kong, Germany and the United Kingdom replacing Canada, Turkey, Lithuania and Denmark. This is likely down to the number of active C&C servers of the Darkai (a clone of Mirai) and AESDDoS bots increasing dramatically, and the old Xor and Yoyo botnets resuming their activities. Although most of these botnets use Linux, the proportion of Linux-based botnets fell slightly in the first quarter compared to the end of last year, accounting for 66% vs 71% in 2017.

Besides, after a short respite, it appears long-lasting attacks are back: the longest DDoS attack of the quarter lasted 297 hours (more than 12 days). The last time we saw a longer attack was at the end of 2015.
The end of the reporting period was marked by the Memcached floods that were unprecedented in terms of their power – in some cases exceeding 1TB. However, Kaspersky Lab experts expect their popularity to be short-lived because Memcached flood attacks not only affect their targets, but also the companies unwittingly involved in carrying out the attacks.

In February, Kaspersky DDoS Protection technical support was contacted by a company complaining that their communication channels were overloaded, leading them to suspect they were being subjected to a DDoS attack. It turned out that one of the company’s servers with the vulnerable Memcached service was being used by criminals to attack another service and generated such huge volumes of outgoing traffic that the company’s own web resources crashed. That’s why these attacks are doomed to be short-lived; the unwitting accomplices in Memcached attacks soon notice the higher load and quickly patch the vulnerabilities to avoid losses, thereby reducing the number of servers available to attackers.

Overall, the popularity of amplification attacks, which was previously on the decline, gained momentum in the first quarter. For example, we registered a rare type of attack, despite its effectiveness, in which the LDAP service was used as an amplifier. Along with Memcached, NTP and DNS, this service has one of the biggest amplification rates. However, unlike Memcached, LDAP junk traffic is barely capable of clogging the outgoing channel completely, making it more difficult for the owner of a vulnerable server to identify and remedy the situation. Despite the relatively small number of available LDAP servers, it is possible that this type of attack will become a hit on the Darknet in the coming months.

Leave your comment

IMPORTANT! To be able to proceed, you need to solve the following simple math

What is 3 + 2 ?
Please leave these two fields as-is:

Mouseworldnow Videos
  • r chandrashekhar president nasscom
  • Anant Maheshwari, President, Microsoft India
  • Suresh_Vaswani-220 by 220

Channel News

  • Fox Mobiles Launches new range of Basic Keypad Phones more...
  • iValue is “APAC VAD” for Micro Focus more...
  • Telr launches its sub-brand TelrSecure more...
  • iValue is “APAC Emerging VAD” for AlgoSec more...
  • Rashi Peripherals Kick-Starts SI Training Program For Partners more...
Subscribe via email

Enter your email address:

What does the mouse ask?

Will the spurt in online video advertisement steal the twinkle from the TV ad platform?

View Results

Loading ... Loading ...
Newsletter Registration