DDoS attacks are a smokescreen

0
231
728

Distributed denial of service (DDoS) attacks make a lot of noise, and according to a new Kaspersky Lab report, that’s exactly what hackers are using them for.

As businesses are preoccupied with handling DDoS attacks, hackers use the opportunity for another, more targeted, and more deadly type of attack. Basically, DDoS is nothing more than a smokescreen. The conclusion comes in Kaspersky Lab’s report, which polled businesses about their cybersecurity experiences. More than half (56 percent) say DDoS is being used to cover something else.

In more than a quarter (29 percent) of attacks, DDoS has been part of the tactics. Another quarter (26 percent) say when they lost data due to a targeted attack, they were also hit by DDoS.

“DDoS prevents a company from continuing its normal activities by putting either public or internal services on hold”, says Kirill Ilganaev, head of Kaspersky DDoS Protection. “This is a real problem to businesses and it is often ‘all hands on deck’ in the IT team to try and fix the problem quickly so the business can carry on as before. DDoS can therefore be used not only as an easy way to stop the activity of a company, but also as a decoy to distract IT staff from another intrusion taking place through other channels.”

View more  Google cozies up with Slack for tighter integration

The usual tactics include exploiting mobile devices, phishing scams, or even malicious activity from insiders.

“The research shows us that DDoS attacks are often aligned with other threats. Businesses therefore need to be aware of the full threat landscape and prepared to deal with multiple types of criminal activity at any one time”, Ilganaev continues. “Failure to do this could increase the collateral damage, on top of already significant losses caused by downtime and the resulting impact on reputation. Businesses need to use a reliable DDoS protection service to reduce the risk of DDoS and help staff concentrate their efforts on protecting the business from any threats that can be hidden as a result”.

Published under license from ITProPortal.com, a Future plc Publication. All rights reserved.

Photo Credit: DD Images/Shutterstock

Source

728

LEAVE A REPLY