{"id":18217,"date":"2021-10-19T02:00:00","date_gmt":"2021-10-19T02:00:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/10\/19\/small-bit-and-piece-cyber-attacks-increase-233-in-2021-according-to-nexusguard\/"},"modified":"2021-10-19T02:00:00","modified_gmt":"2021-10-19T02:00:00","slug":"small-bit-and-piece-cyber-attacks-increase-233-in-2021-according-to-nexusguard","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/10\/19\/small-bit-and-piece-cyber-attacks-increase-233-in-2021-according-to-nexusguard\/","title":{"rendered":"Small, Bit-and-Piece Cyber Attacks increase 233% in 2021, According to Nexusguard"},"content":{"rendered":"<p> \n<\/p>\n<div>\n<p>SINGAPORE &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media OutReach<\/a>\u00a0&#8211;\u00a019 October 2021 &#8211; Small&#13;<br \/>\nbit-and-piece DDoS attacks (distributed denial of service) boomed by 233% in&#13;<br \/>\nthe first half of 2021, revealed <a href=\"https:\/\/www.nexusguard.com\/\">Nexusguard<\/a> researchers in the <sdt sdttag=\"goog_rdk_1\" id=\"2012954445\"\/><sdt sdttag=\"goog_rdk_2\" id=\"-964120739\"\/><a href=\"https:\/\/blog.nexusguard.com\/threat-report\/ddos-threat-report-fhy-2021\">Threat&#13;<br \/>\nReport FHY 2021<\/a>. As the pandemic carried on into 2021, hackers experimented&#13;<br \/>\nwith new attack patterns to avoid signature-based detection. In the first half&#13;<br \/>\nof 2021, more than 99% of all DDoS attacks were smaller than 10Gbps, as&#13;<br \/>\nNexusguard had predicted in 2020. These small, nimble attacks can cripple&#13;<br \/>\ncommunications service providers (CSPs) and Internet service providers (ISPs)&#13;<br \/>\nif they leave detection to threshold or signature-based methods alone.<\/p>\n<p>\u00a0<\/p>\n<p>Attackers are continuing to diversify their&#13;<br \/>\napproaches with bit-and-piece attacks to bring down target networks and&#13;<br \/>\ninfrastructures. More than 95% of attacks were smaller than 1Gbps each, of&#13;<br \/>\nwhich Nexusguard analysts believe a majority were launched using readily&#13;<br \/>\navailable and inexpensive DDoS-for-hire services. Rather than launching large&#13;<br \/>\nbandwidth attacks against their targets, researchers noted that perpetrators&#13;<br \/>\nchose to employ attacks using high packet-rate loads of small-sized traffic&#13;<br \/>\nfrom DDoS-for-hire services, with the aim of evading DDoS mitigation detection&#13;<br \/>\nsystems.<\/p>\n<p>\u00a0<\/p>\n<p>&#8220;The high level of intricacies behind&#13;<br \/>\ncommunications service provider networks causes them to generally allow all&#13;<br \/>\ntypes of traffic to pass through, which leads to smaller or spoofed types of&#13;<br \/>\nattacks to strike undetected,&#8221; said Juniman Kasman, chief technology officer of&#13;<br \/>\nNexusguard. &#8220;Behavioral detection and mitigation approaches are strongly&#13;<br \/>\nrecommended for targeted networks since they can compare peacetime with battles&#13;<br \/>\nand take a wider range of factors into consideration than anomalous thresholds&#13;<br \/>\nor attack signatures.&#8221;<\/p>\n<p>\u00a0<\/p>\n<p>Traffic spoofing and UDP-style attacks were&#13;<br \/>\npopular in the first half of the year, with an 84% increase in UDP attacks&#13;<br \/>\ncompared to the previous six months. Nexusguard observed several types of UDP&#13;<br \/>\nattacks in use, one of which can cause <a href=\"https:\/\/blog.nexusguard.com\/white-paper\/a-new-threat-to-csp-networks-the-impending-black-storm\">&#8220;Black Storm&#8221; attacks <u>theorized<\/u><\/a>&#13;<br \/>\nin recent research. Nexusguard researchers witnessed several service providers&#13;<br \/>\nbear the brunt of DDoS attacks, including <sdt sdttag=\"goog_rdk_4\" id=\"1991060474\"\/><sdt sdttag=\"goog_rdk_5\" id=\"1404950396\"\/><sdt sdttag=\"goog_rdk_6\" id=\"191807611\"\/>\u00a0China Telecom, China Unicom, Vodafone T\u00fcrkiye,&#13;<br \/>\nT\u00fcrk Telekom, Turkcell \u0130leti\u015fim Hizmetleri A.S. receiving the highest&#13;<br \/>\nconcentrations of malicious traffic. Nexusguard advises CSPs to use deep&#13;<br \/>\nlearning-based detection methods, which can help CSPs analyze huge amounts of&#13;<br \/>\ndata quickly and accurately while overcoming the inefficiencies inherent in&#13;<br \/>\nthreshold or signature-based methods.<\/p>\n<p>\u00a0<\/p>\n<p>Nexusguard&#8217;s <a href=\"https:\/\/www.nexusguard.com\/tap100\">TAP100&#13;<br \/>\nProgram<\/a> helps CSPs quickly launch anti-DDoS capabilities to protect&#13;<br \/>\ncustomers. The TAP100 Program removes the hardware barriers associated with&#13;<br \/>\ntypical anti-DDoS service ramp-up, allowing CSP product teams and C-suites to&#13;<br \/>\ncapture new revenue opportunities and ensure superior customer service.<\/p>\n<p>\u00a0<\/p>\n<p>Read <a href=\"https:\/\/blog.nexusguard.com\/threat-report\/ddos-threat-report-fhy-2021\">Nexusguard&#8217;s&#13;<br \/>\nThreat Report FHY 2021<\/a> for more mitigation details based on data gathered&#13;<br \/>\nfrom CSPs, honeypots, botnet scanning and research on traffic moving between&#13;<br \/>\nattackers and their targets.<\/p>\n<p>\u00a0<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-10-19\/99386\/small-bit-and-piece-cyber-attacks-increase-233-in-2021-according-to-nexusguard\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SINGAPORE &#8211;\u00a0Media OutReach\u00a0&#8211;\u00a019 October 2021 &#8211; Small&#13; bit-and-piece DDoS attacks (distributed denial of service) boomed by 233% in&#13; the first half of 2021, revealed Nexusguard researchers in the Threat&#13; Report FHY 2021. As the pandemic carried on into 2021, hackers experimented&#13; with new attack patterns to avoid signature-based detection. In the first half&#13; of 2021, &hellip;<\/p>\n","protected":false},"author":1,"featured_media":18218,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/18217"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=18217"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/18217\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media\/18218"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=18217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=18217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=18217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}